Finch4 / Malware-Analysis-ReportsLinks
My Malware Analysis Reports
☆23Updated 3 years ago
Alternatives and similar repositories for Malware-Analysis-Reports
Users that are interested in Malware-Analysis-Reports are comparing it to the libraries listed below
Sorting:
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 3 years ago
- ☆22Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Updated 3 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 3 years ago
- Lazarus analysis tools and research report☆56Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆18Updated last year
- Default Detections for EDR☆96Updated last year
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- Malware Analysis tools☆26Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆40Updated 3 weeks ago
- Finding secrets in kernel and user memory☆115Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆87Updated 3 years ago
- ☆27Updated 10 months ago
- ProcDot Malware Sandbox☆24Updated 2 months ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- Symantec EDR Internals☆28Updated 3 years ago
- ☆14Updated 2 years ago
- ☆43Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 4 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Updated 3 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago