Wind3x / Practical_Malware_AnalysisLinks
Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
☆19Updated 6 years ago
Alternatives and similar repositories for Practical_Malware_Analysis
Users that are interested in Practical_Malware_Analysis are comparing it to the libraries listed below
Sorting:
- Community-based integrated malware identification system☆82Updated 2 years ago
- ☆43Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- ☆27Updated 7 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- ☆47Updated 5 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆31Updated 5 years ago
- ☆15Updated 4 years ago
- Some rules, scripts of some use to us☆9Updated 8 months ago
- Malware samples observed in the wild from time to time☆12Updated 5 years ago
- API functions for Malware Research☆35Updated 5 years ago
- ☆52Updated 10 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆41Updated 6 years ago
- Malware Machine Learning☆27Updated 7 years ago
- Malquarium - Modern Malware Repository☆47Updated this week
- Python OpenIOC Editor☆18Updated 9 years ago
- ☆21Updated 6 years ago
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- rename☆19Updated 7 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- windows-kernel-exploits Windows平台提权漏洞集合☆24Updated 3 years ago
- ☆24Updated last year
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago