blackhoodieRE / BlackHoodie_Virtual
☆32Updated 5 months ago
Alternatives and similar repositories for BlackHoodie_Virtual:
Users that are interested in BlackHoodie_Virtual are comparing it to the libraries listed below
- Various capabilities for static malware analysis.☆77Updated 6 months ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- Python library for threat intelligence☆84Updated 2 months ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Papers and Presentations from the DFRWS Conferences☆20Updated 2 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated 2 weeks ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 8 months ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆46Updated 11 months ago
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- Hunt malware with Volatility☆47Updated 10 months ago
- ☆15Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- JPCERT/CC public YARA rules repository☆106Updated 3 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 11 months ago
- Jupyter Notebooks for the Blue Team☆145Updated last week
- Intelligence Architecture Mind Map☆127Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Powershell sandboxing utility☆18Updated 3 weeks ago
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆61Updated 3 years ago
- MWDB exercises☆19Updated 2 months ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access…☆54Updated this week
- MAEC Schemas and Schema Development☆87Updated 5 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 2 months ago
- Simple yara rule manager☆66Updated 2 years ago