arxlan786 / Malware-Analysis
Static and Dynamic Analysis of Malware Samples
☆11Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Malware-Analysis
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 6 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆31Updated 2 years ago
- ☆22Updated 2 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆22Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21Updated last year
- Ransomware for demonstration☆14Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- ☆12Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 2 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Another vulnerability scanner☆17Updated last year
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- Perform OSINT on external targets using Shodan☆21Updated 9 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆13Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- A collection of beautified and commented samples of malware implemented in Bash☆10Updated last year
- Tactics, Techniques, and Procedures☆19Updated 8 months ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago