PacktPublishing / Malware-Analysis-TechniquesLinks
Malware Analysis Techniques, published by Packt
☆72Updated 2 years ago
Alternatives and similar repositories for Malware-Analysis-Techniques
Users that are interested in Malware-Analysis-Techniques are comparing it to the libraries listed below
Sorting:
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆120Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆57Updated last year
- Mastering Malware Analysis - Second Edition, published by Packt.☆43Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆145Updated 3 months ago
- Creation of a laboratory for malware analysis in AWS☆101Updated 2 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆187Updated last week
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆179Updated last week
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 6 months ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Incident Response with Threat Intelligence, published by Packt☆52Updated last year
- Detection Engineering with YARA☆87Updated last year
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- pcaps of traffic for traffic analysis workshop☆84Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated 2 years ago
- Malware Analysis Exercise Samples and Resources☆44Updated 3 weeks ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆115Updated last year
- ☆137Updated 3 weeks ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆368Updated 2 years ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆62Updated 6 months ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆59Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A specification and style guide for YARA rules☆50Updated last year
- Resources for learning malware analysis and reverse engineering☆106Updated last year
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆213Updated 3 years ago
- Python API for interacting with sigma rules.☆55Updated 3 years ago
- ☆66Updated 2 years ago
- ☆69Updated 4 months ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆105Updated this week