PacktPublishing / Malware-Analysis-Techniques
Malware Analysis Techniques, published by Packt
☆68Updated 2 years ago
Alternatives and similar repositories for Malware-Analysis-Techniques:
Users that are interested in Malware-Analysis-Techniques are comparing it to the libraries listed below
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆116Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆52Updated 10 months ago
- Jupyter Notebooks for the Blue Team☆144Updated 2 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆164Updated this week
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 2 years ago
- Malware Analysis Exercise Samples and Resources☆40Updated 3 months ago
- Free training course offered at Hack Space Con 2023☆137Updated last year
- Creation of a laboratory for malware analysis in AWS☆92Updated 2 years ago
- Detection Engineering with YARA☆87Updated last year
- Notes and IoCs of fresh malware☆57Updated 7 months ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago
- ☆65Updated 2 years ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆40Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆83Updated last month
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆179Updated 3 weeks ago
- Resources for learning malware analysis and reverse engineering☆106Updated last year
- The Windows Malware Analysis Reversing Core Tools☆91Updated 4 years ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆65Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated last year
- A specification and style guide for YARA rules☆45Updated 11 months ago
- ☆64Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆124Updated 2 years ago
- pcaps of traffic for traffic analysis workshop☆81Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- Incident Response with Threat Intelligence, published by Packt☆52Updated 9 months ago
- ☆155Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 10 months ago