f0wl / MalwareLab_VM-SetupLinks
Setup scripts for my Malware Analysis VMs
☆261Updated 3 years ago
Alternatives and similar repositories for MalwareLab_VM-Setup
Users that are interested in MalwareLab_VM-Setup are comparing it to the libraries listed below
Sorting:
- Code and yara rules to detect and analyze Cobalt Strike☆273Updated 4 years ago
- Exercise writeups from the book Practical Malware Analysis.☆244Updated 2 years ago
- Beta versions of my software☆269Updated 7 months ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆121Updated 3 years ago
- ☆306Updated 4 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆441Updated last year
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆922Updated 4 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆587Updated last year
- Quickly debug shellcode extracted during malware analysis☆625Updated 2 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆752Updated 4 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆519Updated 3 years ago
- ☆212Updated last week
- ☆1,128Updated 2 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆370Updated 4 months ago
- ☆452Updated 4 years ago
- Resources About Windows Security. 1100+ Open Source Tools. 3300+ Blog Post and Videos.☆494Updated 5 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆192Updated last year
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆359Updated 3 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 5 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Updated 3 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 3 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆343Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 3 years ago
- c2 traffic☆194Updated 3 years ago
- Emulate and Dissect MSF and *other* attacks☆143Updated last year
- IOC from articles, tweets for archives☆318Updated 2 years ago
- ☆34Updated 7 years ago
- Threat Intel IoCs + bits and pieces of dark matter☆433Updated last month
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174Updated last year
- Evade sysmon and windows event logging☆624Updated 5 years ago