blackhoodieRE / BlackHoodie_VirtualLinks
☆32Updated 8 months ago
Alternatives and similar repositories for BlackHoodie_Virtual
Users that are interested in BlackHoodie_Virtual are comparing it to the libraries listed below
Sorting:
- Various capabilities for static malware analysis.☆78Updated 9 months ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- Reverse engineering basics in puzzle form☆184Updated 5 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆45Updated 4 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- A repo to support the book☆108Updated 3 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆118Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆56Updated last year
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆63Updated 5 years ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 3 years ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- Set of Yara rules for finding files using magics headers☆138Updated 4 years ago
- A guide on how to write fast and memory friendly YARA rules☆144Updated 4 months ago
- ☆15Updated 3 years ago
- Intelligence Architecture Mind Map☆132Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated last month
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 5 months ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Hunt malware with Volatility☆47Updated last year
- Simple yara rule manager☆66Updated 2 years ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆145Updated 3 months ago
- A list of my personal projects☆177Updated 2 years ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago