blackhoodieRE / BlackHoodie_VirtualLinks
☆32Updated 2 weeks ago
Alternatives and similar repositories for BlackHoodie_Virtual
Users that are interested in BlackHoodie_Virtual are comparing it to the libraries listed below
Sorting:
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆51Updated 6 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆123Updated 2 years ago
- Reverse engineering basics in puzzle form☆182Updated 5 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆263Updated 2 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆121Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆64Updated last year
- repository of tools & resources of the MMD team☆137Updated 3 years ago
- ☆15Updated 4 years ago
- Jupyter Notebooks for the Blue Team☆145Updated 10 months ago
- ☆161Updated 3 years ago
- Malware Analysis Techniques, published by Packt☆78Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆120Updated 2 years ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆92Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆162Updated 11 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆55Updated last year
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆149Updated 2 years ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 5 years ago
- Malduck is your ducky companion in malware analysis journeys☆349Updated 6 months ago
- Research notes☆131Updated last year
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆115Updated this week
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆70Updated this week
- Reads and prints information from the website MalAPI.io☆39Updated 4 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago