blackhoodieRE / BlackHoodie_Virtual
☆32Updated 6 months ago
Related projects: ⓘ
- Various capabilities for static malware analysis.☆75Updated 2 weeks ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆67Updated 2 years ago
- A repo to support the book☆103Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆46Updated 4 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- ☆86Updated this week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆143Updated 11 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆75Updated 5 months ago
- BlackBerry Threat Research & Intelligence☆90Updated 11 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 2 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆73Updated 3 years ago
- Linux Evidence Acquisition Framework☆114Updated 2 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆54Updated 5 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆111Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆108Updated 9 months ago
- Intelligence Architecture Mind Map☆110Updated 6 months ago
- Python library for threat intelligence☆78Updated 2 months ago
- MWDB exercises☆19Updated 3 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆45Updated 5 months ago
- JPCERT/CC public YARA rules repository☆98Updated 2 months ago
- Jupyter Notebooks for the Blue Team☆139Updated last year
- Random hunting ordiented yara rules☆95Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆61Updated 7 months ago
- Reads and prints information from the website MalAPI.io☆38Updated 2 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- Malware similarity platform with modularity in mind.☆75Updated 3 years ago
- Code snips and notes☆129Updated 2 years ago