Skip to content
View jstrosch's full-sized avatar
Block or Report

Block or report jstrosch

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jstrosch/README.md

Hello World! 👋

I have a variety of projects here, many of which focus on helping to learn malware analysis and reverse engineering.

Educational projects

Tools

  • Subcrawl - A framework to identify open directories and classify the content discovered there.
  • Subparse - A framework for parsing files, enriching this data, and making searchable through Elastic
  • SCLauncher - A utility to launch and debug shellcode, as well as produce PE files from the shellcode

Get in touch

Pinned

  1. subcrawl subcrawl Public

    Forked from hpthreatresearch/subcrawl

    SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data with optional output modules, such as Elastic.

    Python 36 4

  2. subparse subparse Public

    Modular malware analysis artifact collection and correlation framework

    Python 49 10

  3. malware-samples malware-samples Public

    Malware samples, analysis exercises and other interesting resources.

    HTML 1.4k 220

  4. learning-malware-analysis learning-malware-analysis Public

    This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …

    C 528 69

  5. learning-reverse-engineering learning-reverse-engineering Public

    This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.

    C 432 72

  6. sclauncher sclauncher Public

    A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode.

    C 76 7