blackhoodieRE / BlackHoodie_Virtual
☆32Updated 3 months ago
Alternatives and similar repositories for BlackHoodie_Virtual:
Users that are interested in BlackHoodie_Virtual are comparing it to the libraries listed below
- Understanding and analyzing carrier files workshop repo☆48Updated 5 years ago
- Various capabilities for static malware analysis.☆77Updated 5 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 2 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- ☆15Updated 3 years ago
- Open Threat Hunting Framework☆109Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆52Updated 10 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- MWDB exercises☆19Updated last month
- Simplified MITRE Use Cases, it describes the Attack and Detection☆41Updated 4 years ago
- Jupyter Notebooks for the Blue Team☆145Updated 2 years ago
- Python library for threat intelligence☆83Updated last month
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated 11 months ago
- ☆144Updated 2 years ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆68Updated this week
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 2 years ago
- The home of the BriMor Labs rdpieces Perl script that tries to rebuild parsed RDP Bitmap Cache images☆79Updated last year
- A python script developed to process Windows memory images based on triage type.☆260Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated 10 months ago
- Malduck is your ducky companion in malware analysis journeys☆326Updated 8 months ago
- Rules shared by the community from 100 Days of YARA 2024☆83Updated last month
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- Random hunting ordiented yara rules☆95Updated last year
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆41Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- BlackBerry Threat Research & Intelligence☆97Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆65Updated last year
- MAEC Schemas and Schema Development☆85Updated 5 years ago