VentressAsajj / MalwareLinks
Recopilación de enlaces para análisis de Malware. También se realizará descarga de automática, worlflows, de los feeds para crear un repositorio de feeds.
☆31Updated this week
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below
Sorting:
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆26Updated last year
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Updated 3 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆81Updated 3 weeks ago
- Una serie de scripts útiles en un proceso de pentesting.☆36Updated 3 weeks ago
- Open source intelligence tools and resources☆126Updated 8 months ago
- RansomwareSim is a simulated ransomware☆159Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆40Updated 5 months ago
- Sniffing out well-known threat groups☆50Updated 11 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆66Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆79Updated last month
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆43Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- This is my personal recopilation about cracking and automatic tools☆51Updated 4 years ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆14Updated last year
- IOC Collection 2022☆57Updated 2 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆155Updated last year
- Just my findings of malwares☆43Updated 2 years ago
- on-the-fly☆85Updated last year
- List of Command&Control (C2) software☆41Updated 2 years ago
- ☆46Updated 4 years ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆29Updated 7 months ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- ☆51Updated 3 weeks ago
- ☆55Updated last year
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆90Updated 4 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Red Team Guides☆138Updated last year
- Malware vulnerability intel tool for third-party attackers☆120Updated 8 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago