Finch4 / Malware-Analysis-Reports
My Malware Analysis Reports
☆19Updated 2 years ago
Alternatives and similar repositories for Malware-Analysis-Reports:
Users that are interested in Malware-Analysis-Reports are comparing it to the libraries listed below
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- ☆47Updated 4 years ago
- ☆34Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- ☆22Updated 8 months ago
- Continuous kerberoast monitor☆44Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- ☆22Updated last year
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- AMSI detection PoC☆31Updated 4 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- ☆33Updated 2 years ago
- ☆15Updated 3 years ago
- ☆26Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆38Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆36Updated 3 years ago
- ☆16Updated 3 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- ProcDot Malware Sandbox☆22Updated 3 months ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- ☆37Updated 9 months ago