ashemery / Anti-Forensics
A Repository to Track Anti-Forensic Techniques
☆104Updated last year
Alternatives and similar repositories for Anti-Forensics:
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
- A C# based tool for analysing malicious OneNote documents☆110Updated last year
- Repository of Yara Rules☆100Updated 2 weeks ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- ☆36Updated 11 months ago
- ☆80Updated 3 months ago
- ☆113Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 8 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆38Updated 5 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆66Updated 4 months ago
- Configuration Extractors for Malware☆91Updated last month
- A collection of tools and detections for the Sliver C2 Frameworj☆116Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 6 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆81Updated last year
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Finding secrets in kernel and user memory☆115Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated 10 months ago
- A collection of tools, scripts and personal research☆125Updated 7 months ago
- ☆20Updated last year
- ☆133Updated last year
- ☆65Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Analyse MSI files for vulnerabilities☆124Updated 6 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆144Updated 10 months ago
- ☆48Updated last year
- ☆64Updated last month
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated last year
- ☆38Updated last year
- Lena's scripts/code/resources for malware analysis☆25Updated 8 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆27Updated 8 months ago