blackhoodieRE / BlackHoodie_VirtualLinks
☆32Updated 9 months ago
Alternatives and similar repositories for BlackHoodie_Virtual
Users that are interested in BlackHoodie_Virtual are comparing it to the libraries listed below
Sorting:
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- Various capabilities for static malware analysis.☆78Updated 11 months ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆120Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆61Updated 3 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆173Updated last month
- Valhalla API Client☆70Updated 2 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆113Updated 6 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆104Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 3 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆106Updated 2 months ago
- MWDB exercises☆20Updated 6 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated last year
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆51Updated last year
- ☆51Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆144Updated 4 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- Automatically create YARA rules from malicious documents.☆211Updated 3 years ago
- PCAP visualization tool☆103Updated 2 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆86Updated 2 years ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆69Updated last week
- Open Threat Hunting Framework☆118Updated 2 years ago
- ☆19Updated 3 years ago