bug-bounty450
google358
microsoft315
facebook265
xss239
apple181
malware172
rce149
exploit131
bragging-post101
cve99
account-takeover93
phishing82
csrf79
privilege-escalation77
stored-xss64
supply-chain64
authentication-bypass62
dos60
reflected-xss57
browser56
react50
cloudflare49
reverse-engineering48
input-validation48
cross-site-scripting47
access-control47
docker46
smart-contract45
node45
aws45
web344
ethereum43
sql-injection42
defi42
web-security40
ssrf40
web-application39
burp-suite35
idor34
vulnerability-disclosure34
info-disclosure34
race-condition33
cloud33
buffer-overflow33
html-injection33
smart-contract-vulnerability32
oauth32
writeup32
information-disclosure30
0
7/10
A comprehensive guide to static malware analysis workflow covering triage, string analysis, PE import analysis, and unpacking, with open-source tools and an orchestrator for automation. The article explains each step's purpose and how to execute the full workflow programmatically.
malware-analysis
static-analysis
pe-analysis
string-extraction
packer-detection
unpacking
triage
automation
iat-analysis
file-metadata
entropy-analysis
yara
windows-executables
reverse-engineering
python-tools
open-source-tools
Andrey Pautov
InfoSec Write-ups
Basic-File-Information-Gathering-Script
String-Analyzer
PE-Import-Analyzer
Static Malware Analysis Orchestrator
VirusTotal