f0wl / MalwareLab_VM-Setup
Setup scripts for my Malware Analysis VMs
☆252Updated 3 years ago
Alternatives and similar repositories for MalwareLab_VM-Setup:
Users that are interested in MalwareLab_VM-Setup are comparing it to the libraries listed below
- Code and yara rules to detect and analyze Cobalt Strike☆264Updated 3 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆906Updated 3 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆320Updated last year
- Beta versions of my software☆249Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆115Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆201Updated last year
- ☆1,047Updated last year
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆367Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆577Updated 10 months ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆735Updated 3 years ago
- Quickly debug shellcode extracted during malware analysis☆590Updated last year
- Scan installed EDRs and AVs on Windows☆577Updated last year
- Hunts out CobaltStrike beacons and logs operator command output☆910Updated 6 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆487Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆174Updated last month
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆253Updated last year
- IOC from articles, tweets for archives☆313Updated last year
- ☆295Updated 3 years ago
- Emulate and Dissect MSF and *other* attacks☆140Updated last year
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆451Updated 3 years ago
- Elemental - An ATT&CK Threat Library☆318Updated 2 years ago
- ☆448Updated 3 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆398Updated 8 months ago
- c2 traffic☆189Updated 2 years ago
- Cobalt Strike Beacon configuration extractor and parser.☆150Updated 3 years ago
- Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMal…☆260Updated last year
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆243Updated 2 years ago
- ☆745Updated last year
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆321Updated 2 years ago