ashubits / Malware-AnalysisLinks
☆11Updated 10 months ago
Alternatives and similar repositories for Malware-Analysis
Users that are interested in Malware-Analysis are comparing it to the libraries listed below
Sorting:
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- Work in Progress repo☆15Updated 6 years ago
- ☆12Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- ☆22Updated 5 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- ☆35Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Manticore Adversary Emulation Cli☆47Updated 5 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Updated 8 years ago
- Carving tool based in Radare2 & Yara☆17Updated 7 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 6 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- ☆20Updated 5 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- ☆19Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- python wrapper to use tshark for file extraction from the command line.☆26Updated 7 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- Simple reverse shell over Slack☆57Updated 4 years ago
- ☆33Updated 11 months ago
- ☆19Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago