f0wl / MalwareLab_VM-Setup
Setup scripts for my Malware Analysis VMs
☆252Updated 3 years ago
Alternatives and similar repositories for MalwareLab_VM-Setup
Users that are interested in MalwareLab_VM-Setup are comparing it to the libraries listed below
Sorting:
- Code and yara rules to detect and analyze Cobalt Strike☆266Updated 4 years ago
- ☆1,053Updated last year
- Beta versions of my software☆253Updated last week
- ☆297Updated 4 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆906Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆578Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆737Updated 3 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆324Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆117Updated 2 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆367Updated 3 years ago
- Hunts out CobaltStrike beacons and logs operator command output☆918Updated 8 months ago
- Detect and respond to Cobalt Strike beacons using ETW.☆494Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆176Updated 3 months ago
- Quickly debug shellcode extracted during malware analysis☆603Updated last year
- c2 traffic☆188Updated 2 years ago
- Expriments☆455Updated 7 months ago
- ☆450Updated 3 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆706Updated 2 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆579Updated last month
- Exercise writeups from the book Practical Malware Analysis.☆223Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆261Updated last year
- Emulate and Dissect MSF and *other* attacks☆140Updated last year
- Scan installed EDRs and AVs on Windows☆583Updated last year
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- ☆415Updated 2 years ago
- Evade sysmon and windows event logging☆623Updated 5 years ago
- ☆130Updated last year
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆247Updated 2 years ago