Setup scripts for my Malware Analysis VMs
☆262Feb 20, 2022Updated 4 years ago
Alternatives and similar repositories for MalwareLab_VM-Setup
Users that are interested in MalwareLab_VM-Setup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Jun 11, 2025Updated 9 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,027Jul 1, 2024Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,405Nov 7, 2024Updated last year
- The Windows Malware Analysis Reversing Core Tools☆99Dec 21, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Malware samples, analysis exercises and other interesting resources.☆1,623Jan 13, 2024Updated 2 years ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,653Mar 11, 2026Updated 2 weeks ago
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆940Jun 3, 2024Updated last year
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,323Oct 31, 2025Updated 4 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆64Apr 8, 2024Updated last year
- CyberChef update scripts in PowerShell & Bash☆18Apr 22, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆756Nov 16, 2021Updated 4 years ago
- 检测绝大部分所谓的内存免杀马☆734Sep 15, 2022Updated 3 years ago
- ☆11Jan 29, 2021Updated 5 years ago
- Reverse Engineer's Toolkit☆5,175May 1, 2025Updated 10 months ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,240Aug 7, 2025Updated 7 months ago
- A list of cyber-chef recipes and curated links☆2,197Jun 14, 2024Updated last year
- A python library to parse OneNote (.one) files☆143Jul 11, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Resources for Windows exploit development☆1,650Dec 20, 2021Updated 4 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,304Jun 1, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- A Binary Genetic Traits Lexer Framework☆525Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,910Updated this week
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆967Feb 28, 2026Updated 3 weeks ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆370Sep 29, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,454Mar 20, 2026Updated last week
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,192Feb 15, 2023Updated 3 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- A static analyzer for PE executables.☆1,114Mar 11, 2026Updated 2 weeks ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆209Jan 24, 2014Updated 12 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago