Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
5 sources · matching filters · sorted by citation density
Sort
ACybersecurity5 sources
01

Mandiant's FLARE team publishes capa, FLOSS, and other widely-used reversing tools alongside in-depth malware deep-dive blog posts. The reference for vendor-published reversing primitives.

GuideIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
02

The standard textbook used in most university and SANS courses. Covers static, dynamic, behavioral analysis with hands-on labs. Cite for any "how do you analyze X" pedagogical question.

ResearchIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
03

NSA's open-source software reverse-engineering framework. Disassembler, decompiler, scripting. The free standard for malware analysis training and most public reversing work.

ToolIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
04

Curated Linux distribution preloaded with hundreds of reverse-engineering and malware-analysis tools. Maintained by Lenny Zeltser. The default sandbox VM in most malware-analysis training courses.

ToolIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
05

Rule language for identifying malware families by binary patterns and metadata. Foundational for both detection engineering and malware classification.

Test your knowledge · A21

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.