Automatically exported from code.google.com/p/malwarecookbook
☆42May 25, 2015Updated 10 years ago
Alternatives and similar repositories for malwarecookbook
Users that are interested in malwarecookbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Malware Analyst's Cookbook stuffs☆160Nov 2, 2015Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- ☆15Jan 10, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Chapter 9: Disseminate☆16Sep 6, 2017Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- window☆13Feb 24, 2017Updated 9 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- ☆12Sep 12, 2020Updated 5 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- ☆15Aug 11, 2019Updated 6 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆57Nov 25, 2020Updated 5 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- SPL cheatsheet for Splunk.☆26Dec 2, 2022Updated 3 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- Antivirus engine that allows you to create your own anti-virus☆11Nov 2, 2012Updated 13 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- Automated IOC-Generation scripts and tools☆24Sep 14, 2016Updated 9 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Nov 7, 2017Updated 8 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- ☆13Feb 6, 2018Updated 8 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Jan 11, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Reinforce good behaviour with a bark detector and deterrer☆11Jun 10, 2020Updated 5 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- Sample files for Control Things Platform☆43Mar 5, 2026Updated last month
- Scripts for Bro IDS and ELK Stack☆57Sep 2, 2015Updated 10 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 4 months ago