Malware-Analysis-Kit
☆14Aug 3, 2015Updated 10 years ago
Alternatives and similar repositories for MAK
Users that are interested in MAK are comparing it to the libraries listed below
Sorting:
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13May 4, 2020Updated 5 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Feb 20, 2024Updated 2 years ago
- ☆28May 25, 2021Updated 4 years ago
- A rewrite of mactime, a bodyfile reader☆39Aug 5, 2024Updated last year
- Files used in the weekly sessions☆11Updated this week
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 2 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Mar 2, 2023Updated 3 years ago
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- ☆13Apr 8, 2022Updated 3 years ago
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل☆15Aug 21, 2023Updated 2 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Library to manipulate CSP reports and policies☆15Apr 18, 2014Updated 11 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Want to automate you or your patient's treatments in a novel way we haven't thought of? TOP APIs make it trivial to expand or change func…☆11Mar 1, 2019Updated 7 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Simple python tool to search http://ixirc.com/☆10Apr 16, 2019Updated 6 years ago
- [DEPRECATED] An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This r…☆13Aug 16, 2023Updated 2 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 5 months ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- A script to convert eml files from various email export systems into an mbox file to be imported inside Thunderbird Apple Mail etc.☆13Jan 17, 2022Updated 4 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- ☆12Apr 7, 2021Updated 4 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago