LaurieWired / linux_malware_analysis_containerLinks
Docker container for quickly analyzing Linux malware
β77Updated last year
Alternatives and similar repositories for linux_malware_analysis_container
Users that are interested in linux_malware_analysis_container are comparing it to the libraries listed below
Sorting:
- This contains notes and slides for my talk on Reverse Engineering Android Malwareβ51Updated last year
- π§ββοΈ malware analysisβ37Updated last year
- Lena's repo of Malware Monsters aka Malmons.β41Updated last week
- Different learning materialsβ227Updated 4 months ago
- A repository of credential stealer formatsβ222Updated last month
- Wordlist to crack .zip-file passwordβ204Updated 3 years ago
- This contains notes and slides for my REcon 2024 talk on Auto Unpacking Android Malwareβ26Updated last year
- A list of useful tools for Malware Analysis (will be updated regularly)β142Updated 11 months ago
- Public repository containing materials for various malware-related streams.β36Updated 3 weeks ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.β301Updated last year
- Turn binaries into musicβ50Updated last year
- A collection of malware families and malware samples which use the Rust programming language.β172Updated last year
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forβ¦β312Updated 2 weeks ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.β365Updated this week
- Collection of codes focused on Linux rootkitsβ143Updated last month
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtubeβ12Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandboxβ126Updated last year
- The most complete code auditing platform with thousands of real-world challengesβ125Updated last month
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can helβ¦β192Updated 2 weeks ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedroβ75Updated 3 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.β63Updated 3 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malwareβ53Updated 4 months ago
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk useβ¦β107Updated last month
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.β160Updated 8 months ago
- This contains notes and slides for my Objective by the Sea talkβ95Updated last year
- General purpose attack-defense range for zero-config deploymentβ30Updated 5 months ago
- This contains notes, slides, and code for my Infosec World talkβ15Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflowsβ42Updated 3 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptinβ¦β122Updated 7 months ago
- β35Updated last year