1. Dynamic Analysis Tools
    1. Windows | Sysinternals
    2. Windows | Process Hacker
    3. Windows | NirSoft
    4. Windows | RegRipper
    5. Windows | Regshot
    6. Windows | Resource Hacker
    7. Windows | HxD
    8. Windows | Sysanalyzer
    9. Windows | Winaudit
    10. Windows | Capturebat
    11. MacOs | Object-See
    12. Free
  2. APT's Reference:
    1. Attack Mitre
    2. Threat Actor Encyclopedia
    3. Cyber Research
    4. ATP Google Sheet
    5. FireEye
    6. CyberMonitor
    7. Florian Roth
    8. MalPedia
    9. Threat Actor Encyclopedia V 2.0
    10. A Threat Actor Encyclopedia
    11. APT_Digital_Weapon
    12. Contains Malware Samples
  3. Malware Samples
    1. VirusBay
      1. Registration
        1. support@virusbay.io
    2. Malpedia
      1. Registration
        1. daniel.plohmann@fkie.fraunhofer.de
    3. Malshare
      1. Registration
    4. TheZoo
      1. N.A
    5. VirusShare
      1. Registration
        1. admin@virusshare.com
    6. VX Vault
      1. Registration
    7. Cyber Tracker
      1. N.A
    8. Virus Sign
      1. Registration
    9. Malware Traffic Analysis
      1. N.A
    10. Contagio
      1. N.A
    11. APT-Sample
      1. N.A
    12. LOLBAN Samples
      1. N.A
    13. Tracker.VirusShare
      1. N.A
    14. MalwareBazzar
      1. Registration
    15. Contains Malware Samples
  4. Books:
    1. Practical Malware Analysis
    2. Learning Malware Analysis
    3. Malware Analysis and Detection Engineering
    4. Mastering Malware Analysis
    5. Practical Reverse Engineering
    6. The Art of Memory Forensics
    7. Windows Internals, Part 1
    8. The IDA Pro Book, 2nd Edition
    9. Reverse Engineering for Beginners
    10. Paid
    11. Free
  5. CTF's
    1. Flare-On Challenge
    2. Join ESET
    3. Beginner Malware Reversing Challenges
    4. Reverse Engineering challenges
    5. 0x00sec
    6. CTF Field Guide
    7. MemLabs
  6. File Carving Tools
    1. Bulk Extractor | Linux, MacOs
    2. EVTXtract | Windows
    3. Foremost | Linux, MacOs
    4. Hachiir3 | All Patform
    5. Free
  7. Deobfuscation Tools
    1. Decalage
    2. De4dot
    3. Floss
    4. PackerAttacker
    5. Unpaker
    6. VirtualDeobfuscator
    7. XORSearch & XORStrings
    8. Unpca.Me
    9. Free
    10. Registration
  8. Disassembler Tools
    1. X64 | Windows
    2. OllyDbg | Windows
    3. ILSpy | Windows
    4. DNSpy | Windows
    5. GDB | All Os Platform
    6. Binary Ninja | All Os Platform
    7. Qira | Linux
    8. Free
  9. Classes/Labs
    1. PracticalMalwareAnalysis-Labs
    2. Reverse Engineering 101
    3. Intro to x86
    4. Intro to x86-64
    5. Malware Dynamic Analysis
    6. Introduction To Software Exploits
    7. Intermediate Intel x86
    8. Reverse Engineering Malware
    9. RPISEC
    10. Reverse Engineering 101 Speaker Presentation
    11. Reverse Engineering 101 NYU:Poly 2010 (Day 1)
    12. Reverse Engineering 101 NYU:Poly 2010 (Day 2)
    13. Reverse Engineering for Beginners
    14. Malware Analysis
    15. Reverse Engineering for Beginners
    16. Malware Analysis - CSCI 4976
    17. Max Kersten
    18. Free
  10. Document Analysis Tools
    1. Ole Tool
    2. Didier's PDF Tools
    3. Origami
    4. REMnux | Virtual OS
    5. PDF
    6. ViperMonkey
    7. Free
  11. Malware Analysis Course
    1. Malware Analysis Master Course
    2. FOR610
    3. Malware Analysis Mindset Training
    4. Reversing & Malware Analysis Training
    5. Advanced Malware Analysis Training
    6. Paid
    7. Free
  12. Honeypot Reference
    1. Conpot | ICS/SCADA honeypot.
    2. Cowrie | SSH honeypot based on Kippo.
    3. DemoHunter | Low interaction Distributed Honeypots.
    4. Dionaea | Honeypot designed to trap malware.
    5. Glastopf | Web application honeypot.
    6. Honeyd | Create a virtual honeynet.
    7. HoneyDrive | Honeypot bundle Linux distro.
    8. Honeytrap | Opensource system for running monitoring and managing honeypots.
    9. MHN | Centralized server for management and data collection of honeypots.
    10. Mnemosyne | A normalizer for honeypot data; supports Dionaea.
    11. Thug | Low interaction honeyclient for investigating malicious websites.
    12. Free
  13. Memory Acquisition Tools
    1. Redline | Windows
    2. Belkasoft | Windows
    3. Magnet | Windows
    4. Ftk Imager | Windows, MacOs
    5. Dumpit | Windows
    6. LiME | Linux
    7. Free
  14. Resources