BSidesRoc 2022 Linux Malware/Forensics Course
☆75Mar 19, 2022Updated 4 years ago
Alternatives and similar repositories for BSidesRoc2022_Linux_Malware_Analysis_Course
Users that are interested in BSidesRoc2022_Linux_Malware_Analysis_Course are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shmoocon 2019 Firetalk☆21Jan 18, 2019Updated 7 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆89Updated this week
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- Everything related to Linux Forensics☆718Jul 13, 2023Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆12Apr 3, 2023Updated 2 years ago
- ☆23Jun 1, 2022Updated 3 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Mar 2, 2024Updated 2 years ago
- ☆44Jul 11, 2025Updated 8 months ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- Sample files for Control Things Platform☆43Mar 5, 2026Updated 2 weeks ago
- A series of writes about “Binary Exploitation”.☆85Jun 25, 2023Updated 2 years ago
- ☆21May 8, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- Archive for acez.re blog.☆21Apr 17, 2023Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆134Aug 20, 2025Updated 7 months ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Jun 21, 2022Updated 3 years ago
- From Zero to Hero in Web Security Research - Def Con 29 Workshop☆37Jul 23, 2024Updated last year
- Multi-arch SoapySDR container running SoapySDRServer. Suppors RTL-SDR,bladeRF,HackRF,AirSpy,AirSpyHF,LimeSDR,PlutoSDR.☆14Dec 4, 2020Updated 5 years ago
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- OWASP Coimbatore's Web & Project Repository☆13Mar 5, 2026Updated 2 weeks ago
- Swagger Directory Enumeration (SDE)☆21Jan 16, 2021Updated 5 years ago
- ☆69May 3, 2021Updated 4 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆39Jul 23, 2025Updated 8 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- ☆34Jul 6, 2024Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago