P3t3rp4rk3r / Malware-AnalysisView external linksLinks
☆11Oct 28, 2016Updated 9 years ago
Alternatives and similar repositories for Malware-Analysis
Users that are interested in Malware-Analysis are comparing it to the libraries listed below
Sorting:
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- ☆11Feb 14, 2025Updated last year
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27May 13, 2022Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- A series of GPO templates☆21Jan 2, 2017Updated 9 years ago
- POC tool to abuse windows server failover clusters☆54Aug 7, 2025Updated 6 months ago
- Webextension experiment proposing 'printservice' Javascript API☆10Jul 25, 2018Updated 7 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 8 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆32May 25, 2024Updated last year
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆41Jun 6, 2023Updated 2 years ago
- Support et TPs pour les cours de terminal/Git/Linux dispensés à l'école Hétic en Web1☆12Jan 5, 2023Updated 3 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- webshare is a CLI tool that provides web-interface for your local files☆13Dec 2, 2018Updated 7 years ago
- Official GitHub repository for Ruby/Ruby on Rails study group☆10Feb 12, 2019Updated 7 years ago
- Terraform module for Cloudera Manager☆11May 6, 2020Updated 5 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Support Kotlin in Flycheck☆14Jan 11, 2023Updated 3 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 2 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- Explains how to setup a omnibus full gitlab-ce (git, registry, pages) with HTTPS and Let's Encrypt certificates☆10Jan 4, 2022Updated 4 years ago
- 🛡 Check Windows and Control Configs and Security - CWiCCS (read as QUICKS)☆13Jan 14, 2023Updated 3 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Jan 23, 2022Updated 4 years ago
- Server-side SDK to provide a simple REST API for distribution of security information.☆16May 11, 2016Updated 9 years ago
- perl libnet library☆10Aug 3, 2025Updated 6 months ago
- CLI tool to analyze APKs☆42Mar 28, 2024Updated last year
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- OpenShift Enterprise Training Manual☆13Apr 8, 2013Updated 12 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Callbackery a Frontend Builder Toolkit☆11Nov 4, 2025Updated 3 months ago