f0wl / MalwareLab_VM-SetupLinks
Setup scripts for my Malware Analysis VMs
☆258Updated 3 years ago
Alternatives and similar repositories for MalwareLab_VM-Setup
Users that are interested in MalwareLab_VM-Setup are comparing it to the libraries listed below
Sorting:
- Code and yara rules to detect and analyze Cobalt Strike☆272Updated 4 years ago
- Exercise writeups from the book Practical Malware Analysis.☆243Updated 2 years ago
- Beta versions of my software☆267Updated 7 months ago
- ☆306Updated 4 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆920Updated 4 years ago
- ☆212Updated last month
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆121Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆587Updated last year
- Quickly debug shellcode extracted during malware analysis☆623Updated 2 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆751Updated 4 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 3 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆370Updated 3 months ago