BSidesRoc 2022 Linux Malware/Forensics Course
☆75Mar 19, 2022Updated 3 years ago
Alternatives and similar repositories for BSidesRoc2022_Linux_Malware_Analysis_Course
Users that are interested in BSidesRoc2022_Linux_Malware_Analysis_Course are comparing it to the libraries listed below
Sorting:
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- This repo is where I store my Threat Hunting ideas/content☆88May 9, 2023Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Everything related to Linux Forensics☆718Jul 13, 2023Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆11Apr 3, 2023Updated 2 years ago
- Parameter-Reflect-Finder is a python based tool that helps you find reflected parameters which can have potential XSS or Open redirection…☆16Aug 8, 2022Updated 3 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- ☆10Oct 25, 2020Updated 5 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- ☆13Dec 29, 2022Updated 3 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago
- An automated setup for fuzzing Redis w/ AFL++☆35Mar 12, 2022Updated 3 years ago
- Archive for acez.re blog.☆20Apr 17, 2023Updated 2 years ago
- ☆12Sep 17, 2020Updated 5 years ago
- ☆10May 15, 2020Updated 5 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- PHP HTTP client library for checking JNE shipment prices☆13Mar 9, 2016Updated 9 years ago
- Maltego integration of https://abusix.com☆16Sep 2, 2018Updated 7 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- Noob Penetration tester☆11Jul 17, 2025Updated 7 months ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago