DakotaNelson / practical-malware-analysisLinks
Working through Practical Malware Analysis from No Starch Press
☆13Updated 8 years ago
Alternatives and similar repositories for practical-malware-analysis
Users that are interested in practical-malware-analysis are comparing it to the libraries listed below
Sorting:
- windows-operating-system-archaeology @Enigma0x3 @subTee☆46Updated 8 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- Basic file metadata gathering script☆21Updated 2 months ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 8 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Toolkit to detected abnormal activities on a Windows machine.☆11Updated 9 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- Data exfiltration PoC scripts☆25Updated 9 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago