blackhoodieRE / BlackHoodie_VirtualLinks
☆32Updated 2 months ago
Alternatives and similar repositories for BlackHoodie_Virtual
Users that are interested in BlackHoodie_Virtual are comparing it to the libraries listed below
Sorting:
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆123Updated 2 years ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- repository of tools & resources of the MMD team☆136Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆51Updated 5 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆118Updated 6 years ago
- Malduck is your ducky companion in malware analysis journeys☆346Updated 4 months ago
- Research notes☆129Updated 11 months ago
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆62Updated 4 years ago
- Code snips and notes☆137Updated 3 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆148Updated 7 months ago
- ☆23Updated 5 years ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆70Updated this week
- MAEC Schemas and Schema Development☆89Updated 5 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated last month
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- ☆212Updated last week
- Stash for Binary Exploitation and Reverse Engineering Resources☆106Updated 5 years ago
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- A python script developed to process Windows memory images based on triage type.☆265Updated last year
- The Windows Malware Analysis Reversing Core Tools☆97Updated 4 years ago
- A guide on how to write fast and memory friendly YARA rules☆157Updated 9 months ago
- Resources for learning malware analysis and reverse engineering☆138Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Updated last year