f0wl / MalwareLab_VM-SetupLinks
Setup scripts for my Malware Analysis VMs
☆254Updated 3 years ago
Alternatives and similar repositories for MalwareLab_VM-Setup
Users that are interested in MalwareLab_VM-Setup are comparing it to the libraries listed below
Sorting:
- Exercise writeups from the book Practical Malware Analysis.☆226Updated last year
- Code and yara rules to detect and analyze Cobalt Strike☆269Updated 4 years ago
- Beta versions of my software☆257Updated last month
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆741Updated 3 years ago
- ☆300Updated 4 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆582Updated last year
- ☆206Updated 3 weeks ago
- ☆1,074Updated last year
- Quickly debug shellcode extracted during malware analysis☆605Updated 2 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆421Updated last year
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆912Updated 3 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 2 years ago
- Resources About Windows Security. 1100+ Open Source Tools. 3300+ Blog Post and Videos.☆494Updated 5 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆710Updated 2 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆332Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆250Updated 2 years ago
- Hunts out CobaltStrike beacons and logs operator command output☆932Updated 10 months ago
- Detect and respond to Cobalt Strike beacons using ETW.☆502Updated 3 years ago
- Emulate and Dissect MSF and *other* attacks☆141Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆607Updated 3 weeks ago
- c2 traffic☆189Updated 2 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆369Updated 3 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆333Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆171Updated 3 weeks ago
- Community modules for CAPE Sandbox☆101Updated 2 weeks ago
- Threat Intel IoCs + bits and pieces of dark matter☆412Updated last month
- Scan installed EDRs and AVs on Windows☆585Updated 2 weeks ago
- ☆452Updated 3 years ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆273Updated last year
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆179Updated last week