blackhoodieRE / BlackHoodie_VirtualLinks
☆32Updated 3 months ago
Alternatives and similar repositories for BlackHoodie_Virtual
Users that are interested in BlackHoodie_Virtual are comparing it to the libraries listed below
Sorting:
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- repository of tools & resources of the MMD team☆137Updated 3 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆124Updated 2 years ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆120Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆51Updated 6 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆147Updated 2 years ago
- Malduck is your ducky companion in malware analysis journeys☆348Updated 6 months ago
- ☆212Updated 6 months ago
- ☆161Updated 3 years ago
- ☆15Updated 4 years ago
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆121Updated 6 years ago
- Code snips and notes☆138Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆161Updated 10 months ago
- Research notes☆131Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- MAEC Schemas and Schema Development☆89Updated 5 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆146Updated 9 months ago
- MWDB exercises☆20Updated 11 months ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Updated 2 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆91Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 3 years ago
- Malware similarity platform with modularity in mind.☆79Updated 4 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆188Updated 2 weeks ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 5 years ago