VentressAsajj / MalwareLinks
Recopilación de enlaces para análisis de Malware. También se realizará descarga de automática, worlflows, de los feeds para crear un repositorio de feeds.
☆31Updated this week
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below
Sorting:
- Una serie de scripts útiles en un proceso de pentesting.☆43Updated 5 months ago
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- RansomwareSim is a simulated ransomware☆169Updated last year
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆26Updated 2 years ago
- on-the-fly☆86Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆82Updated 5 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆95Updated last month
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆94Updated 4 years ago
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Updated 4 years ago
- OSINT - Data Visualization - Blockchain - Awareness - Scam☆43Updated 2 years ago
- Open source intelligence tools and resources☆142Updated 4 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Updated last year
- ☆24Updated 4 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆37Updated 3 weeks ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆46Updated 3 years ago
- Sniffing out well-known threat groups☆64Updated last year
- ☆21Updated last year
- A comprehensive automation script for penetration testing and reconnaissance.☆43Updated last year
- ☆50Updated 5 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆39Updated last year
- Graphical map of known Advanced Persistent Threats☆62Updated this week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- ☆57Updated 6 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 8 months ago