filipi86 / MalwareAnalysis-in-PDF
Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code on the computer system for user exploitation.
☆206Updated 2 years ago
Alternatives and similar repositories for MalwareAnalysis-in-PDF:
Users that are interested in MalwareAnalysis-in-PDF are comparing it to the libraries listed below
- Jupyter Notebooks for the Blue Team☆144Updated 2 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆113Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆173Updated 3 weeks ago
- Malware Analysis Techniques, published by Packt☆68Updated 2 years ago
- 0xpat blog☆100Updated 3 years ago
- MBC content in markdown☆405Updated last month
- Notes and IoCs of fresh malware☆57Updated 7 months ago
- The Windows Malware Analysis Reversing Core Tools☆91Updated 4 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 2 years ago
- Understanding and analyzing carrier files workshop repo☆48Updated 5 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆130Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- Collection of resources that are made by the Malware Research community☆220Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆116Updated last year
- Ransomware leak site monitoring☆310Updated 2 years ago
- Personal research and publication on malware families☆137Updated last month
- Resources for learning malware analysis and reverse engineering☆106Updated last year
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆83Updated 7 years ago
- A tool designed to hunt for Phishing Kit source code☆217Updated last year
- Gets updates from various clearnet domains and ransomware threat actor domains☆381Updated 9 months ago
- Collection of various files from infected hosts☆71Updated 2 years ago
- Warning! This repository contains samples of ransomware.☆92Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated last year
- ☆198Updated last year
- A python script developed to process Windows memory images based on triage type.☆260Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆277Updated 5 months ago
- Run several volatility plugins at the same time☆111Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Just some lists of Malware Configs☆168Updated last month
- Malware Sandboxes & Malware Source☆87Updated 7 years ago