A book covering the whole spectrum of Malware
☆36Sep 8, 2024Updated last year
Alternatives and similar repositories for MalwareHandbook
Users that are interested in MalwareHandbook are comparing it to the libraries listed below
Sorting:
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- A simple guideline for MacOs Security.☆13Jun 15, 2022Updated 3 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- PowerShell tool to triage systems☆12May 17, 2023Updated 2 years ago
- ☆23Oct 9, 2024Updated last year
- My Custom made Nuceli-Templates☆22Aug 5, 2025Updated 7 months ago
- A tiny set of helper scripts for ipinfo☆17Aug 7, 2020Updated 5 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆26Mar 22, 2018Updated 7 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 6 years ago
- Pass-thru web server for traffic redirection☆28May 6, 2019Updated 6 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- Simple DNS exfiltration using base64-encoded URL's☆14Jul 25, 2017Updated 8 years ago
- Static file analysis for PE files☆13Dec 4, 2020Updated 5 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Oct 28, 2018Updated 7 years ago
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Mar 29, 2021Updated 4 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- A desktop App to add STIX-2 objects to TAXII-2.0 servers☆11Mar 13, 2019Updated 7 years ago
- Malware Machine Learning☆27Apr 1, 2018Updated 7 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Aug 18, 2021Updated 4 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- Android Pentest Setup Environment☆30May 9, 2022Updated 3 years ago
- Decoding Facebook's GraphQL API schema☆38Jan 1, 2021Updated 5 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- A curated list of Docker resources☆28Nov 13, 2015Updated 10 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Dec 27, 2022Updated 3 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Aug 12, 2025Updated 7 months ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆25Jun 19, 2017Updated 8 years ago
- A go-exploit to scan for implanted Cisco IOS XE Systems☆41Oct 28, 2024Updated last year
- Python interface to wigle website☆25Jun 22, 2024Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year