TheEnergyStory / malware_analysis_toolsLinks
Tools helpful for malware analysis
☆23Updated last year
Alternatives and similar repositories for malware_analysis_tools
Users that are interested in malware_analysis_tools are comparing it to the libraries listed below
Sorting:
- ☆27Updated last year
- ☆18Updated last year
- Malware Analysis tools☆26Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- General malware analysis stuff☆37Updated last year
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- A repo to house files for our blogposts on blog.nviso.eu☆74Updated 9 months ago
- ☆49Updated 2 years ago
- AdHoc solutions☆48Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- pypykatz plugin for volatility3 framework☆44Updated 6 months ago
- Lazarus analysis tools and research report☆57Updated last year
- My Malware Analysis Reports☆24Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- ☆44Updated last month
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- ☆23Updated 3 years ago
- ☆37Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 4 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- A collection of my presentation materials.☆17Updated last year
- A PoC for achieving persistence via push notifications on Windows☆48Updated 2 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago