https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fkaras00.notion.site%2F3-Malware-Analysis-2f71c2d377d141c6a90801c748aa511e&count_bg=%2379C83D&title_bg=%23555555&icon=&icon_color=%23E7E7E7&title=hits&edge_flat=false)](https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fkaras00.notion.site%2F3-Malware-Analysis-2f71c2d377d141c6a90801c748aa511e&count_bg=%2379C83D&title_bg=%23555555&icon=&icon_color=%23E7E7E7&title=hits&edge_flat=false)](https://hits.seeyoufarm.com))

2-0. 분석환경

2-1. 악성코드 분석 개요

2-2. 정적 분석

2-3. 동적, 행위분석

2-4. 자동화 분석

2-5. 리버싱

2-6. 기반 지식 및 용어

Malware Sandboxing

패킷분석실습(cyberchef)

https://github.com/MISP/MISP