5h3r10ck / memory-forensics-workshopLinks
A memory forensics workshop i delivered to the ENSIAS IT Cybersecurity members
☆14Updated 6 years ago
Alternatives and similar repositories for memory-forensics-workshop
Users that are interested in memory-forensics-workshop are comparing it to the libraries listed below
Sorting:
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- The DFRWS 2018 challenge (extended into 2019) is the second in a series of challenges dealing with Internet of Things (IoT). IoT is defin…☆57Updated 4 years ago
- Resource for developing infosec skills for OSCP☆115Updated last year
- ☆34Updated last month
- Custom checklists, cheatsheets, links, and scripts☆128Updated 6 years ago
- repository of tools & resources of the MMD team☆138Updated 3 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- Web application to create indexes for GIAC certification examinations.☆150Updated 2 years ago
- ☆145Updated 6 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆22Updated 5 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆153Updated 6 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆237Updated 5 years ago
- Understanding and analyzing carrier files workshop repo☆51Updated 6 years ago
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆240Updated 2 years ago
- A malware analysis and classification tool.☆190Updated 4 years ago
- Mindmaps for threat hunting - work in progress.☆152Updated 3 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 6 years ago
- CTF write-ups repository☆42Updated 2 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Updated 7 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- Red Team Tactics, Techniques, and Procedures☆420Updated last week
- This repository contains files from AppGate / Immunity Malware Analysis Team.☆21Updated 4 years ago
- links collected from SOC Core Skills class☆85Updated 5 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated 2 years ago
- ☆23Updated 5 years ago
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- ☆97Updated 11 months ago