L3cr0f / pma_courseLinks
Practical Malware Analysis Course
☆20Updated 3 years ago
Alternatives and similar repositories for pma_course
Users that are interested in pma_course are comparing it to the libraries listed below
Sorting:
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆211Updated 6 months ago
- Collection of resources that are made by the Malware Research community☆235Updated 2 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆320Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆748Updated 3 months ago
- ☆124Updated last year
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆163Updated 3 years ago
- Malware development for red teaming workshop☆225Updated 4 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆414Updated last year
- A compact guide to network pivoting for penetration testings / CTF challenges.☆224Updated last year
- Certified Red Team Operator☆446Updated 3 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆217Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆213Updated 5 years ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆149Updated last year
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆794Updated last year
- ☆380Updated 2 weeks ago
- Jupyter Notebooks for the Blue Team☆145Updated 10 months ago
- ☆479Updated 3 years ago
- Most of the notes, resources and scripts I used to prepare for the OSCP and pass it the first time.☆76Updated 3 years ago
- Just some lists of Malware Configs☆173Updated last year
- ☆199Updated last year
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆682Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆742Updated 8 months ago
- List of red team resources☆100Updated 8 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆195Updated 11 months ago
- Malware Development for Ethical Hackers, published by Packt☆436Updated last month
- A general purpose cheat sheet for pentesting and OSCP certification☆246Updated 2 weeks ago
- PEN-300 collection to help you on your exam.☆685Updated 5 months ago
- Creation of a laboratory for malware analysis in AWS☆105Updated 3 years ago
- My attempt at weaponizing Discord.☆18Updated 3 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆750Updated last year