ashemery / Anti-ForensicsLinks
A Repository to Track Anti-Forensic Techniques
☆109Updated 2 years ago
Alternatives and similar repositories for Anti-Forensics
Users that are interested in Anti-Forensics are comparing it to the libraries listed below
Sorting:
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- ☆81Updated 7 months ago
- ☆85Updated 2 years ago
- ☆67Updated 4 months ago
- ☆119Updated last year
- A ProcessMonitor visualization application written in rust.☆181Updated last year
- ☆37Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆56Updated last year
- Configuration Extractors for Malware☆106Updated 2 months ago
- A collection of tools, scripts and personal research☆133Updated 2 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆47Updated 3 months ago
- Repository of Yara Rules☆111Updated 2 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated 2 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆80Updated 9 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆37Updated last year
- Some of my Malware Analysis writeups.☆46Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated last month
- ☆66Updated 2 years ago
- ☆133Updated 3 months ago
- Run Your Payload Without Running Your Payload☆182Updated 2 years ago
- POC for frustrating/defeating Malware Analysts☆154Updated 3 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated 9 months ago
- ☆136Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆83Updated 3 weeks ago
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆34Updated 7 months ago
- ☆20Updated last year