DakotaNelson / practical-malware-analysis
Working through Practical Malware Analysis from No Starch Press
☆13Updated 7 years ago
Alternatives and similar repositories for practical-malware-analysis:
Users that are interested in practical-malware-analysis are comparing it to the libraries listed below
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- ☆22Updated 4 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- ☆26Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 11 months ago
- Oracle Attacks Tool☆13Updated 8 years ago
- ☆20Updated 4 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 6 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago