VentressAsajj / MalwareLinks
Recopilación de enlaces para análisis de Malware. También se realizará descarga de automática, worlflows, de los feeds para crear un repositorio de feeds.
☆31Updated this week
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below
Sorting:
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Updated 3 years ago
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆26Updated last year
- ☆55Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- ☆25Updated 11 months ago
- Coleccion de IRM de Societe Generale traducidos por mí al Español☆34Updated 8 years ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆28Updated 7 months ago
- A comprehensive automation script for penetration testing and reconnaissance.☆37Updated 10 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆80Updated last week
- OSINT - Data Visualization - Blockchain - Awareness - Scam☆42Updated last year
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Updated 7 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆66Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆29Updated last year
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆22Updated 10 months ago
- ☆51Updated last week
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- Scripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited☆16Updated 3 years ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆14Updated last year
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆31Updated 10 months ago
- Una serie de scripts útiles en un proceso de pentesting.☆36Updated this week
- ☆19Updated 6 months ago
- This is my personal recopilation about cracking and automatic tools☆51Updated 4 years ago
- ☆32Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- Labs built in docker to cover NSE lessons☆11Updated last year
- Challenge Python☆19Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆43Updated 2 years ago
- ☆24Updated 4 months ago
- Repository of cybersecurity mindmaps☆32Updated 2 years ago