ctf-malware

Installation
Summary

Malware analysis and network traffic techniques for CTF challenges.

  • Covers script deobfuscation (JavaScript, PowerShell, base64/hex decoding), YARA rule writing, shellcode analysis with Unicorn Engine and Capstone, and memory forensics using Volatility 3 (malfind, process injection detection)
  • Includes PE and .NET binary analysis (peframe, dnSpy, AsmResolver), malware configuration extraction, and sandbox evasion detection (VM detection, timing checks, API hashing)
  • Provides C2 traffic analysis techniques: PCAP inspection, custom crypto protocol identification (RC4, AES-CBC, ChaCha20), DNS tunneling, and beaconing pattern recognition
  • Covers anti-analysis evasion techniques: environment checks, debugger detection, process injection methods, and tools for unpacking PyInstaller and PyArmor binaries
SKILL.md

CTF Malware & Network Analysis

Quick reference for malware analysis CTF challenges. Each technique has a one-liner here; see supporting files for full details with code.

Prerequisites

Python packages (all platforms):

pip install yara-python pefile capstone oletools unicorn pycryptodome \
  volatility3 dissect.cobaltstrike

Linux (apt):

apt install strace ltrace tshark binwalk binutils

macOS (Homebrew):

Related skills

More from ljagiello/ctf-skills

Installs
3.1K
GitHub Stars
2.0K
First Seen
Feb 1, 2026