Finch4 / Malware-Analysis-ReportsLinks
My Malware Analysis Reports
☆22Updated 3 years ago
Alternatives and similar repositories for Malware-Analysis-Reports
Users that are interested in Malware-Analysis-Reports are comparing it to the libraries listed below
Sorting:
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 3 years ago
- ☆22Updated last year
- Lazarus analysis tools and research report☆56Updated last year
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 3 years ago
- ☆27Updated 9 months ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆87Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆22Updated 2 years ago
- Finding secrets in kernel and user memory☆116Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- Golang bindings for PE-sieve☆42Updated last year
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Python wrappers for mal_unpack☆36Updated last year
- Malware Analysis tools☆26Updated 11 months ago
- A small utility to deal with malware embedded hashes.☆52Updated last year
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆72Updated 5 months ago
- ☆43Updated 3 years ago