A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.
☆14Sep 7, 2021Updated 4 years ago
Alternatives and similar repositories for Malware-Study
Users that are interested in Malware-Study are comparing it to the libraries listed below
Sorting:
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆15Nov 16, 2023Updated 2 years ago
- Post-exploitation script developed using impacket☆21Mar 15, 2022Updated 3 years ago
- Challenges where you can practice heap tecnics☆24Nov 18, 2017Updated 8 years ago
- A personal malware feed which downloads and classifies the latest samples from Malshare.☆22Sep 27, 2021Updated 4 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Oct 4, 2019Updated 6 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- ☆38Jan 3, 2022Updated 4 years ago
- ☆13Jul 29, 2024Updated last year
- ☆42Aug 12, 2022Updated 3 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- ☆14Jan 18, 2020Updated 6 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- A C# DLL Wrapper Generator☆11Feb 23, 2022Updated 4 years ago
- Virtual HID Device Emulation Framework for Windows☆22May 28, 2025Updated 9 months ago
- ☆10Aug 28, 2020Updated 5 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/corkami☆10Mar 26, 2015Updated 10 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Exploring Methods of Protecting Confidential Erlang Workloads with Intel SGX☆12Jun 19, 2020Updated 5 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- my n00b notes on web_study☆16May 29, 2025Updated 9 months ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- ☆10Sep 24, 2025Updated 5 months ago