Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
https://github.com/LordNoteworthy/al-khaser
MALWARE REPOS:
BLOGS:
CONTENT:
https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/
http://www.staroceans.org/e-book/bitlackeys/index.html#research