☆13Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for Static-Dynamic-Malware-Analysis
Users that are interested in Static-Dynamic-Malware-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jan 21, 2026Updated 2 months ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- Repository resource for threat hunter☆158Sep 14, 2018Updated 7 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- ☆22Jun 2, 2023Updated 2 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- 22-23-24 Temmuz 2022 Tarihinde yapılan Siber Güvenlik Eğitimlerine Ait Dökümanlar☆31Jan 19, 2026Updated 2 months ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆11Jan 7, 2023Updated 3 years ago
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆24Mar 18, 2026Updated last week
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- TP-Link Archer T2U Plus / AC600 High Gain USB Wifi Adapter Review & Driver installation Guide for Kali Linux.☆25Jan 25, 2023Updated 3 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- Manage efficiently your heavy side-channel datasets with eShard library and process them with http://gitlab.com/eshard/scared. This is a …☆14Jan 28, 2026Updated last month
- ☆22Updated this week
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Recordization library☆11Mar 11, 2026Updated last week
- The SJTU-AN21 dataset is an anonymity network dataset generated by ten anonymity services.☆11Apr 14, 2023Updated 2 years ago
- Serein工具的护网版,针对2022年护网(hvv)期间出现的漏洞编写。☆13Aug 4, 2022Updated 3 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆38Mar 25, 2024Updated last year
- 365 days of hacking (漏洞挖掘365天挑战)☆17Mar 2, 2022Updated 4 years ago
- Training and support materials for MSTICPy☆18Jun 27, 2023Updated 2 years ago
- ☆13Jul 3, 2021Updated 4 years ago
- 一款辅助安全研发在日常 工作中渗透测试、安全研究、安全开发等工作的工具!☆13Nov 20, 2023Updated 2 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- 针对《解密家用路由器0day漏洞挖掘技术》一书的相关笔记☆16Oct 12, 2020Updated 5 years ago
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Repository that will progressively hold tiny projects and code snippets.☆24Jun 13, 2025Updated 9 months ago
- Maw Mod code adapted for MMMerge☆35Mar 15, 2026Updated last week
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Jan 15, 2024Updated 2 years ago
- Add-on for World of Warcraft to perform music in game.☆13Feb 26, 2026Updated 3 weeks ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 8 months ago