filipi86 / MalwareAnalysis-in-PDF
Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code on the computer system for user exploitation.
☆204Updated 2 years ago
Alternatives and similar repositories for MalwareAnalysis-in-PDF:
Users that are interested in MalwareAnalysis-in-PDF are comparing it to the libraries listed below
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆172Updated last week
- Jupyter Notebooks for the Blue Team☆144Updated 2 years ago
- Warning! This repository contains samples of ransomware.☆92Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆91Updated 2 years ago
- 0xpat blog☆100Updated 3 years ago
- Collection of resources that are made by the Malware Research community☆220Updated last year
- Understanding and analyzing carrier files workshop repo☆48Updated 5 years ago
- Resources for learning malware analysis and reverse engineering☆105Updated 11 months ago
- Malware Analysis Techniques, published by Packt☆68Updated 2 years ago
- A curated list of awesome malware analysis tools and resources☆56Updated 3 years ago
- A tool designed to hunt for Phishing Kit source code☆217Updated last year
- MBC content in markdown☆402Updated 3 weeks ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆113Updated 2 years ago
- Notes and IoCs of fresh malware☆59Updated 6 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Personal research and publication on malware families☆137Updated last month
- Malware repository component for samples & static configuration with REST API interface.☆336Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆103Updated last year
- Example reports from prior years of the Collegiate Penetration Testing Competition☆138Updated 8 months ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆93Updated this week
- The Windows Malware Analysis Reversing Core Tools☆90Updated 4 years ago
- Rules shared by the community from 100 Days of YARA 2024☆83Updated 3 weeks ago
- Different learning materials☆223Updated 5 months ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆375Updated 9 months ago
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- MAL-CL (Malicious Command-Line)☆309Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆52Updated 9 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆397Updated last week
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆84Updated 2 years ago