ashemery / OSLinks
Python code illustrating different operating system terminologies, techniques, and solutions
☆70Updated 3 years ago
Alternatives and similar repositories for OS
Users that are interested in OS are comparing it to the libraries listed below
Sorting:
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 4 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- ☆138Updated 2 years ago
- ☆120Updated 2 years ago
- ☆15Updated 4 years ago
- Different learning materials☆228Updated 4 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Research notes☆130Updated last year
- A repo to support the book☆113Updated 4 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆136Updated 5 months ago
- Detection Engineering with YARA☆87Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- ☆66Updated 3 years ago
- ☆84Updated last year
- Purple Team Strategies, Published by Packt☆12Updated 3 years ago
- Malware Analysis Exercise Samples and Resources☆56Updated this week
- Reads and prints information from the website MalAPI.io☆39Updated 4 years ago
- Jupyter Notebooks for the Blue Team☆145Updated 10 months ago
- Collection of resources that are made by the Malware Research community☆236Updated 2 years ago
- ☆63Updated 2 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆61Updated 6 months ago
- The best resources for learning exploit development☆123Updated 6 years ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆111Updated 2 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year