blackhoodieRE / BlackHoodie_Virtual
☆32Updated 6 months ago
Alternatives and similar repositories for BlackHoodie_Virtual
Users that are interested in BlackHoodie_Virtual are comparing it to the libraries listed below
Sorting:
- Various capabilities for static malware analysis.☆78Updated 8 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆61Updated 3 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆45Updated 4 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- HoneyPot Orchestration☆10Updated last year
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- ☆18Updated 4 months ago
- Python library for threat intelligence☆86Updated 4 months ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆21Updated 4 years ago
- MWDB exercises☆19Updated 3 months ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago
- MAEC Schemas and Schema Development☆87Updated 5 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Linux Evidence Acquisition Framework☆118Updated 7 months ago
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆107Updated 6 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Standardized Malware Analysis Tool☆52Updated 4 years ago
- A guide on how to write fast and memory friendly YARA rules☆142Updated 3 months ago
- A repo to support the book☆108Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated last week