VentressAsajj / MalwareLinks
Recopilación de enlaces para análisis de Malware. También se realizará descarga de automática, worlflows, de los feeds para crear un repositorio de feeds.
☆31Updated this week
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below
Sorting:
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆26Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0☆52Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- OSINT - Data Visualization - Blockchain - Awareness - Scam☆41Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Repository of cybersecurity mindmaps☆34Updated 2 years ago
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Updated 3 years ago
- Una serie de scripts útiles en un proceso de pentesting.☆43Updated 2 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆91Updated 5 months ago
- Sniffing out well-known threat groups☆63Updated last year
- on-the-fly☆85Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆87Updated last week
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆13Updated 2 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated 2 years ago
- ☆65Updated 2 years ago
- ☆34Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 8 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- ☆55Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- A collection of Script for Red Team & Incidence Response☆11Updated 3 years ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆90Updated 4 years ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆170Updated 2 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Red Team Guides☆140Updated last year