1. Memory Analysis Tools
    1. Volatility
      1. Windows, MacOS, Linux
    2. Rekall
      1. Windows, MacOS, Linux
    3. Redline
      1. Widows
    4. Free
  2. Network Analysis Tools
    1. Wireshark
      1. Windows. MacOs, Linux
    2. NetworkMiner
      1. Windows
    3. Network Monitor
      1. Windows
    4. Fiddler
      1. Windows
    5. FakeNet
      1. Windows, Linux
    6. INetSim
      1. Linux
    7. ApateDNS
      1. Windows
    8. Free
  3. Dynamic Analysis Tools
    1. Sysinternals
      1. Windows
    2. Process Hacker
      1. Windows
    3. NirSoft
      1. Windows
    4. RegRipper
      1. Windows
    5. Regshot
      1. Windows
    6. Resource Hacker
      1. Windows
    7. HxD
      1. Windows
    8. Sysanalyzer
      1. Windows
    9. Winaudit
      1. Windows
    10. Capturebat
      1. Windows
    11. Object-See
      1. MacOs
    12. Free
  4. APT's Reference:
    1. Attack Mitre
    2. Threat Actor Encyclopedia
    3. Cyber Research
    4. ATP Google Sheet
    5. FireEye
    6. CyberMonitor
    7. Florian Roth
    8. MalPedia
    9. Threat Actor Encyclopedia V 2.0
    10. A Threat Actor Encyclopedia
    11. APT_Digital_Weapon
    12. Contains Malware Samples
  5. Malware Samples
    1. VirusBay
      1. Registration
        1. support@virusbay.io
    2. Malpedia
      1. Registration
        1. daniel.plohmann@fkie.fraunhofer.de
    3. Malshare
      1. Registration
    4. TheZoo
      1. No
    5. VirusShare
      1. Registration
        1. admin@virusshare.com
    6. VX Vault
      1. Registration
    7. Cyber Tracker
      1. No
    8. Virus Sign
      1. Registration
    9. Malware Traffic Analysis
      1. No
    10. Contagio
      1. No
    11. APT-Sample
      1. No
    12. LOLBAN Samples
      1. No
    13. Tracker.VirusShare
      1. No
    14. MalwareBazzar
      1. Registration
    15. Contains Malware Samples
  6. Books:
    1. Practical Malware Analysis
    2. Learning Malware Analysis
    3. Malware Analysis and Detection Engineering
    4. Mastering Malware Analysis
    5. Practical Reverse Engineering
    6. The Art of Memory Forensics
    7. Windows Internals, Part 1
    8. The IDA Pro Book, 2nd Edition
    9. Reverse Engineering for Beginners
    10. Paid
    11. Free
  7. CTF's
    1. Flare-On Challenge
    2. Join ESET
    3. Beginner Malware Reversing Challenges
    4. Reverse Engineering challenges
    5. 0x00sec
    6. CTF Field Guide
    7. MemLabs
  8. File Carving Tools
    1. Bulk Extractor
      1. Linux, MacOs
    2. EVTXtract
      1. Windows
    3. Foremost
      1. Linux, MacOs
    4. Hachiir3
      1. All Os Patform
    5. Free
  9. Portable Executable [PE] Analysis Tools
    1. PE Bear
      1. Windows
    2. PortEx
      1. Windows
    3. Manalyze
      1. Windows
    4. PE Studio
      1. Windows
    5. Mastiff
      1. Windows
    6. Exeinfo PE
      1. Windows
    7. CFF Explorer
      1. Windows
    8. PE Tools
      1. Windows
    9. FileAlyzer
      1. Windows
    10. PE Explorer
      1. Windows
    11. PE Insider
      1. Windows
    12. PE View
      1. Windows
    13. Chimprec
      1. Windows
    14. PEID
      1. Windows
    15. DIE
      1. Windows. MacOs, Linux
    16. Free
  10. Online Sandbox
    1. Malpedia
      1. Registration
        1. All os platform
    2. Joe SandBox
      1. No
        1. All os platform, Url analyze
    3. MalwareBazzar
      1. Yes
        1. Document Analyzer, File Analyze
    4. Hybrid Analysis
      1. Yes
        1. All os platform, Url analyze
    5. Any Run
      1. User Preference
        1. All os platform, Url analyze
    6. Yomi
      1. Yes
        1. Document Analyzer, File Analyze
    7. Hatching
      1. Yes
        1. All os platform, Url analyze
    8. Cuckoo
      1. No
        1. All os platform, Url analyze
    9. Sndbox
      1. Yes
        1. All os platform, Url analyze
    10. Virus Total
      1. User Preference
        1. All os platform, Url analyze
    11. UrlScan
      1. User Preference
        1. Url analyze
    12. Checkphish
      1. User Preference
        1. Url analyze
    13. Url Void
      1. No
        1. Url analyze
    14. TotalHash
      1. No
        1. Hash Analyzer, IP Analyzer, Domain Analyzer
    15. Intezer
      1. Yes
        1. All os platform
    16. Maltiverse
      1. Yes
        1. IOC Search engine
    17. Malware Sample can download
  11. Deobfuscation Tools
    1. Decalage
    2. De4dot
    3. Floss
    4. PackerAttacker
    5. Unpaker
    6. VirtualDeobfuscator
    7. XORSearch & XORStrings
    8. Unpca.Me
    9. Free
    10. Registration
  12. Memory Acquisition Tools
    1. Redline
      1. Widows
    2. Belkasoft
      1. Widows
    3. Magnet
      1. Widows
    4. Ftk Imager
      1. Windows, MacOS
    5. Dumpit
      1. Widows
    6. LiME
      1. Linux
    7. Free
  13. Disassembler Tools
    1. X64
      1. Widows
    2. OllyDbg
      1. Widows
    3. ILSpy
      1. Widows
    4. DNSpy
      1. Widows
    5. GDB
      1. All Os Platform
    6. Binary Ninja
      1. All Os Platform
    7. Qira
      1. Linux
    8. Free
  14. Classes/Labs
    1. PracticalMalwareAnalysis-Labs
    2. Reverse Engineering 101
    3. Intro to x86
    4. Intro to x86-64
    5. Malware Dynamic Analysis
    6. Introduction To Software Exploits
    7. Intermediate Intel x86
    8. Reverse Engineering Malware
    9. RPISEC
    10. Reverse Engineering 101 Speaker Presentation
    11. Reverse Engineering 101 NYU:Poly 2010 (Day 1)
    12. Reverse Engineering 101 NYU:Poly 2010 (Day 2)
    13. Reverse Engineering for Beginners
    14. Malware Analysis
    15. Reverse Engineering for Beginners
    16. Malware Analysis - CSCI 4976
    17. Max Kersten
    18. Free
  15. Document Analysis Tools
    1. Ole Tool
    2. Didier's PDF Tools
    3. Origami
    4. REMnux
      1. Linux Virtual OS
    5. PDF
    6. ViperMonkey
    7. Free
  16. Honeypot Reference
    1. Conpot
      1. ICS/SCADA honeypot.
    2. Cowrie
      1. SSH honeypot based on Kippo.
    3. DemoHunter
      1. Low interaction Distributed Honeypots.
    4. Dionaea
      1. Honeypot designed to trap malware.
    5. Glastopf
      1. Web application honeypot.
    6. Honeyd
      1. Create a virtual honeynet.
    7. HoneyDrive
      1. Honeypot bundle Linux distro.
    8. Honeytrap
      1. Opensource system for running monitoring and managing honeypots.
    9. MHN
      1. Centralized server for management and data collection of honeypots.
    10. Mnemosyne
      1. A normalizer for honeypot data; supports Dionaea.
    11. Thug
    12. Free
  17. Offline Sanbox
    1. Cuckoo
      1. All Os Platform
        1. Document Analyzer, File Analyzer
    2. Limone
      1. Widows
        1. Document Analyzer, File Analyzer, Memory Analyzer
    3. Noriben
      1. Widows
        1. Document Analyzer, File Analyzer
    4. Assemblyline 4
      1. Widows
        1. Document Analyzer, File Analyzer
    5. Free
  18. Malware Analysis Course
    1. Malware Analysis Master Course
    2. FOR610
    3. Malware Analysis Mindset Training
    4. Reversing & Malware Analysis Training
    5. Advanced Malware Analysis Training
    6. Paid
    7. Free
  19. Resources