Wind3x / Practical_Malware_Analysis
Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
☆19Updated 6 years ago
Alternatives and similar repositories for Practical_Malware_Analysis:
Users that are interested in Practical_Malware_Analysis are comparing it to the libraries listed below
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- ☆43Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆31Updated 5 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- A curated list of awesome malware analysis tools and resources☆45Updated 4 years ago
- ☆27Updated 7 years ago
- A collection of Volatility Framework plugins.☆26Updated 11 years ago
- Python3 Metasploit automation library☆21Updated 2 years ago
- Python OpenIOC Editor☆17Updated 9 years ago
- ☆47Updated 5 years ago
- PyCommands for Immunity Debugger☆27Updated 11 years ago
- Listen for usb devices and automatically submit all files on device to cuckoo☆12Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 5 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- ☆21Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Python wrapper for the Mitre ATT&CK framework API☆27Updated 6 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 10 years ago
- Malware Machine Learning☆27Updated 6 years ago
- ActiveMime File Format Documentation☆17Updated 3 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago