bug-bounty448
google357
microsoft314
facebook265
xss240
apple181
malware167
rce149
exploit129
bragging-post101
cve99
account-takeover91
phishing79
csrf79
privilege-escalation77
stored-xss64
supply-chain62
authentication-bypass62
dos59
reflected-xss57
browser56
react51
cloudflare49
reverse-engineering48
input-validation48
access-control47
docker46
cross-site-scripting46
smart-contract45
aws45
node45
web344
ethereum43
sql-injection42
defi42
ssrf40
web-security40
web-application39
burp-suite35
vulnerability-disclosure34
idor34
race-condition33
html-injection33
info-disclosure33
writeup33
buffer-overflow32
cloud32
oauth32
smart-contract-vulnerability32
information-disclosure30
0
7/10
A comprehensive guide to static malware analysis workflow covering triage, string analysis, PE import analysis, and unpacking, with open-source tools and an orchestrator for automation. The article explains each step's purpose and how to execute the full workflow programmatically.
malware-analysis
static-analysis
pe-analysis
string-extraction
packer-detection
unpacking
triage
automation
iat-analysis
file-metadata
entropy-analysis
yara
windows-executables
reverse-engineering
python-tools
open-source-tools
Andrey Pautov
InfoSec Write-ups
Basic-File-Information-Gathering-Script
String-Analyzer
PE-Import-Analyzer
Static Malware Analysis Orchestrator
VirusTotal