CyberSecurityUP / Awesome-Malware-and-Reverse-Engineering
☆424Updated 2 years ago
Alternatives and similar repositories for Awesome-Malware-and-Reverse-Engineering:
Users that are interested in Awesome-Malware-and-Reverse-Engineering are comparing it to the libraries listed below
- ☆705Updated 2 years ago
- A curated list of awesome Memory Forensics for DFIR☆396Updated last week
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆219Updated this week
- ☆800Updated last year
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆628Updated 7 months ago
- ☆336Updated 2 years ago
- Useful resources for SOC Analyst and SOC Analyst candidates.☆671Updated last year
- Labs for Practical Malware Analysis & Triage☆935Updated last month
- Practical Windows Forensics Training☆647Updated last year
- Projects for security students and professionals☆167Updated 7 months ago
- Collection of resources that are made by the Malware Research community☆222Updated last year
- List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting p…☆507Updated last month
- ☆416Updated this week
- ☆1,483Updated 2 years ago
- ☆338Updated 2 years ago
- Different learning materials☆223Updated 6 months ago
- ☆311Updated 7 months ago
- Certified Red Team Operator☆367Updated 2 years ago
- Checklists for Testing Security environment☆770Updated 3 weeks ago
- A Huge Learning Resources with Labs For Offensive Security Players☆947Updated 2 years ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆187Updated last year
- A RedTeam Toolkit☆395Updated 4 months ago
- ☆209Updated 3 years ago
- I have collected many Free Resources. Feel free share more resources☆294Updated 2 years ago
- A list of bookmarks I have used since I started my journey in cyber security☆283Updated 2 years ago
- ☆195Updated 2 years ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆550Updated 4 months ago
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆673Updated 2 years ago
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆330Updated last year
- Playbooks for SOC Analysts☆422Updated 2 years ago