filipi86 / MalwareAnalysis-in-PDFLinks
Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code on the computer system for user exploitation.
☆213Updated 3 years ago
Alternatives and similar repositories for MalwareAnalysis-in-PDF
Users that are interested in MalwareAnalysis-in-PDF are comparing it to the libraries listed below
Sorting:
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆145Updated 3 months ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆179Updated last week
- Ransomware leak site monitoring☆313Updated 3 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Updated 3 years ago
- Malware Analysis Techniques, published by Packt☆72Updated 2 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Warning! This repository contains samples of ransomware.☆92Updated 2 years ago
- 0xpat blog☆100Updated 3 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆120Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆187Updated last week
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆115Updated last year
- IoT Digital Forensics Course with hands-on labs☆228Updated last year
- A tool designed to hunt for Phishing Kit source code☆223Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆143Updated last year
- Creation of a laboratory for malware analysis in AWS☆101Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆105Updated this week
- This repository contains indicators of compromise (IOCs) of our various investigations.☆269Updated last week
- Example reports from prior years of the Collegiate Penetration Testing Competition☆147Updated this week
- Malware repository component for samples & static configuration with REST API interface.☆362Updated 3 weeks ago
- Threat Hunting tool about Sysmon and graphs☆334Updated 2 years ago
- Just some lists of Malware Configs☆171Updated 6 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆326Updated 2 months ago
- MAL-CL (Malicious Command-Line)☆314Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆263Updated last year