blackhoodieRE / BlackHoodie_Virtual
☆32Updated 6 months ago
Alternatives and similar repositories for BlackHoodie_Virtual:
Users that are interested in BlackHoodie_Virtual are comparing it to the libraries listed below
- Various capabilities for static malware analysis.☆77Updated 7 months ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- Research notes☆123Updated 4 months ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆116Updated 2 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- MAEC Schemas and Schema Development☆87Updated 5 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated last year
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- MWDB exercises☆19Updated 3 months ago
- Reverse engineering basics in puzzle form☆184Updated 4 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆46Updated 11 months ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 3 months ago
- JPCERT/CC public YARA rules repository☆106Updated 4 months ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- Set of Yara rules for finding files using magics headers☆137Updated 4 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Papers and Presentations from the DFRWS Conferences☆20Updated 2 years ago
- Code snips and notes☆137Updated 3 years ago
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- Open Threat Hunting Framework☆114Updated last year
- Malduck is your ducky companion in malware analysis journeys☆329Updated this week
- ☆199Updated last year