c3rb3ru5d3d53c / c3rb3ru5d3d53c.github.io
My Malware Blog
☆22Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for c3rb3ru5d3d53c.github.io
- The Windows Malware Analysis Reversing Core Tools☆89Updated 3 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆75Updated 3 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆144Updated this week
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆49Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆47Updated 7 months ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆63Updated last year
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- A C# based tool for analysing malicious OneNote documents☆107Updated last year
- Free training course offered at Hack Space Con 2023☆132Updated last year
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆54Updated this week
- A python script developed to process Windows memory images based on triage type.☆258Updated 11 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆270Updated 2 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆49Updated 7 months ago
- ☆16Updated 3 weeks ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated 11 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆71Updated 2 years ago
- ☆56Updated 2 weeks ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated 10 months ago
- Understanding and analyzing carrier files workshop repo☆47Updated 4 years ago
- Dump quarantined files from Windows Defender☆56Updated 2 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆130Updated 2 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆109Updated 2 years ago
- Blueteam operational triage registry hunting/forensic tool.☆142Updated last year
- ☆187Updated last week
- ☆114Updated 7 months ago
- A repo to support the book☆103Updated 3 years ago
- A GUI to query the API of abuse.ch.☆70Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆141Updated last year