Skip to content
View jstrosch's full-sized avatar
Block or Report

Block or report jstrosch

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jstrosch/README.md

Hello World! 👋

I have a variety of projects here, many of which focus on helping to learn malware analysis and reverse engineering.

Educational projects

Tools

  • Subcrawl - A framework to identify open directories and classify the content discovered there.
  • Subparse - A framework for parsing files, enriching this data, and making searchable through Elastic
  • SCLauncher - A utility to launch and debug shellcode, as well as produce PE files from the shellcode

Get in touch

Pinned Loading

  1. subcrawl subcrawl Public

    Forked from hpthreatresearch/subcrawl

    SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data with optional output modules, such as Elastic.

    Python 46 6

  2. subparse subparse Public

    Modular malware analysis artifact collection and correlation framework

    Python 49 11

  3. malware-samples malware-samples Public

    Malware samples, analysis exercises and other interesting resources.

    HTML 1.4k 225

  4. learning-malware-analysis learning-malware-analysis Public

    This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …

    C 574 71

  5. learning-reverse-engineering learning-reverse-engineering Public

    This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.

    C 467 78

  6. sclauncher sclauncher Public

    A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode.

    C 104 8