CyberSecurityUP / Awesome-Malware-and-Reverse-EngineeringLinks
☆446Updated 2 years ago
Alternatives and similar repositories for Awesome-Malware-and-Reverse-Engineering
Users that are interested in Awesome-Malware-and-Reverse-Engineering are comparing it to the libraries listed below
Sorting:
- ☆728Updated 2 years ago
- ☆340Updated 2 years ago
- A curated list of awesome Memory Forensics for DFIR☆458Updated 4 months ago
- ☆314Updated 11 months ago
- ☆842Updated last year
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆236Updated this week
- List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting p…☆535Updated 5 months ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- Projects for security students and professionals☆192Updated 11 months ago
- ☆1,545Updated 2 years ago
- I have collected many Free Resources. Feel free share more resources☆301Updated 2 years ago
- ☆417Updated 2 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆647Updated 11 months ago
- ☆135Updated 2 years ago
- Useful resources for SOC Analyst and SOC Analyst candidates.☆766Updated last year
- Certified Red Team Operator☆416Updated 3 years ago
- Practical Windows Forensics Training☆667Updated last year
- ☆227Updated 2 years ago
- ☆495Updated last week
- List of red team resources☆94Updated 7 years ago
- Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool☆796Updated last year
- Resources for learning about Exploit Development☆391Updated 4 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆968Updated 2 years ago
- ☆200Updated 2 years ago
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆683Updated 2 years ago
- Checklists for Testing Security environment☆804Updated 3 months ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- ☆342Updated 2 years ago
- ☆208Updated 3 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆476Updated last month