f0wl / MalwareLab_VM-Setup
Setup scripts for my Malware Analysis VMs
☆251Updated 3 years ago
Alternatives and similar repositories for MalwareLab_VM-Setup:
Users that are interested in MalwareLab_VM-Setup are comparing it to the libraries listed below
- Code and yara rules to detect and analyze Cobalt Strike☆265Updated 3 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆731Updated 3 years ago
- Quickly debug shellcode extracted during malware analysis☆582Updated last year
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆907Updated 3 years ago
- ☆1,044Updated last year
- ☆294Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆575Updated 9 months ago
- Detect and respond to Cobalt Strike beacons using ETW.☆486Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆200Updated last year
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆320Updated last year
- Hunts out CobaltStrike beacons and logs operator command output☆908Updated 5 months ago
- Scan installed EDRs and AVs on Windows☆577Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆566Updated 2 weeks ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆367Updated 3 years ago
- ☆196Updated 4 months ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆644Updated 11 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- Expriments☆451Updated 4 months ago
- ☆740Updated last year
- Beta versions of my software☆249Updated last year
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca …☆398Updated 7 months ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆515Updated 3 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆336Updated 4 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆453Updated 3 years ago
- Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]☆596Updated 2 years ago
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆455Updated 9 months ago
- ☆447Updated 3 years ago
- A protective and Low Level Shellcode Loader that defeats modern EDR systems.☆900Updated 11 months ago
- IOC from articles, tweets for archives☆313Updated last year
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆159Updated 4 months ago