Karneades / awesome-malware-persistenceLinks
A curated list of awesome malware persistence tools and resources.
☆238Updated 2 months ago
Alternatives and similar repositories for awesome-malware-persistence
Users that are interested in awesome-malware-persistence are comparing it to the libraries listed below
Sorting:
- ☆374Updated this week
- Collection of resources that are made by the Malware Research community☆229Updated 2 years ago
- ☆70Updated 4 years ago
- This is a repository of resource about Malware techniques☆810Updated 2 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆197Updated last month
- Just some lists of Malware Configs☆172Updated 8 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆254Updated 2 weeks ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆403Updated last year
- Bringing you the best of the worst files on the Internet.☆336Updated 4 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆195Updated last week
- My collection of malware dev links☆287Updated 3 months ago
- A curated list of awesome malware analysis tools and resources☆103Updated 3 years ago
- Resources for learning malware analysis and reverse engineering☆134Updated last year
- Just another collection of links, tools, reports and other stuff☆24Updated 4 years ago
- Centralized resource for listing and organizing known injection techniques and POCs☆625Updated last month
- A curated list of awesome Memory Forensics for DFIR☆481Updated 6 months ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆181Updated 2 months ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆433Updated last year
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆901Updated 4 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ☆123Updated last year
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆913Updated last year
- The best tools and resources for forensic analysis.☆165Updated 2 years ago
- All binaries file of the PracticalMalwareAnalysis-Labs copied from internet☆40Updated 8 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆309Updated this week
- Different learning materials☆228Updated 6 months ago
- Small collection of Ransomware organized by family.☆249Updated 11 months ago
- collection of apis used in malware development☆228Updated 3 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆655Updated last year
- ☆507Updated last year