Still34 / malware-lab
Public repository containing materials for various malware-related streams.
☆22Updated 3 months ago
Related projects: ⓘ
- Capture screenshots of onion services on an onion service.☆50Updated 3 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆43Updated 9 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆16Updated 3 months ago
- A collection of tools that I use in CTF's or for assessments☆50Updated last month
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 6 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated 8 months ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆39Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆62Updated 8 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆28Updated 4 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated 6 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆27Updated 3 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 9 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆18Updated 5 months ago
- ☆44Updated 2 weeks ago
- ☆29Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 3 months ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆106Updated 7 months ago
- Hive v5 file decryption algorithm☆34Updated last year
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆36Updated 8 months ago
- ☆35Updated 9 months ago
- Repo for all my exploits/PoCs☆28Updated this week
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated 10 months ago
- This repositery contains the slides, sometimes videos, and materials of my talks.☆25Updated last month
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 2 months ago
- ☆77Updated 5 months ago
- Challenge Python☆18Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated 10 months ago