blackhoodieRE / BlackHoodie_VirtualLinks
☆32Updated last month
Alternatives and similar repositories for BlackHoodie_Virtual
Users that are interested in BlackHoodie_Virtual are comparing it to the libraries listed below
Sorting:
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆123Updated 2 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- Malware Analysis Techniques, published by Packt☆76Updated 2 years ago
- Understanding and analyzing carrier files workshop repo☆51Updated 5 years ago
- repository of tools & resources of the MMD team☆134Updated 3 years ago
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆115Updated 6 years ago
- MAEC Schemas and Schema Development☆88Updated 5 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- Malduck is your ducky companion in malware analysis journeys☆346Updated 4 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- ☆158Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆146Updated 7 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 2 years ago
- ☆23Updated 5 years ago
- The Windows Malware Analysis Reversing Core Tools☆96Updated 4 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆62Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Updated last year
- ☆211Updated 4 months ago
- A guide on how to write fast and memory friendly YARA rules☆153Updated 8 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- Collection of created MindMaps☆151Updated last year
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆54Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Rules shared by the community from 100 Days of YARA 2024☆86Updated 9 months ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆107Updated 5 months ago
- BlackBerry Threat Research & Intelligence☆99Updated 2 years ago