blackhoodieRE / BlackHoodie_VirtualLinks
☆32Updated 10 months ago
Alternatives and similar repositories for BlackHoodie_Virtual
Users that are interested in BlackHoodie_Virtual are comparing it to the libraries listed below
Sorting:
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Various capabilities for static malware analysis.☆78Updated 11 months ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆121Updated 2 years ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 2 years ago
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆113Updated 6 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆146Updated 5 months ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆52Updated last year
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 3 years ago
- PCAP visualization tool☆103Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- repository of tools & resources of the MMD team☆132Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆255Updated 2 years ago
- This repository is for the vagrant instances of VulnHub machines☆47Updated 11 months ago
- ☆153Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- A python script developed to process Windows memory images based on triage type.☆265Updated last year
- Research notes☆128Updated 8 months ago
- Repository of tools and resources for analyzing Docker containers☆67Updated last year
- Malduck is your ducky companion in malware analysis journeys☆339Updated 2 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆175Updated 2 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆105Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated last year
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year