ashemery / OSLinks
Python code illustrating different operating system terminologies, techniques, and solutions
☆70Updated 2 years ago
Alternatives and similar repositories for OS
Users that are interested in OS are comparing it to the libraries listed below
Sorting:
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- ☆136Updated 2 years ago
- ☆15Updated 4 years ago
- Different learning materials☆228Updated 5 months ago
- A repo to support the book☆108Updated 4 years ago
- Detection Engineering with YARA☆87Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 8 months ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆43Updated 2 years ago
- Purple Team Strategies, Published by Packt☆12Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated 2 weeks ago
- ☆66Updated 2 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆116Updated 11 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆58Updated last month
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆88Updated 3 weeks ago
- Repository of tools and resources for analyzing Docker containers☆67Updated last year
- Jupyter Notebooks for the Blue Team☆146Updated 5 months ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- ☆119Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆121Updated 2 years ago
- ☆82Updated 9 months ago
- Research notes☆128Updated 8 months ago