hslatman / awesome-malware-analysisView external linksLinks
A curated list of awesome malware analysis tools and resources
☆45Jul 17, 2020Updated 5 years ago
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
Sorting:
- A curated list of tools for incident response☆20Sep 24, 2019Updated 6 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- A collection of SSL/TLS security related resources.☆56Jan 13, 2025Updated last year
- Various Crypter Project☆10Feb 26, 2014Updated 11 years ago
- awesome-windows-security-development☆178Mar 15, 2018Updated 7 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 3 weeks ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated last month
- ☆76Sep 30, 2021Updated 4 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- LLM-Powered Code Security Scanning☆19Apr 2, 2025Updated 10 months ago
- ☆32Jun 10, 2020Updated 5 years ago
- IDA Pro плагин для отображения результата Coresight ETM трассировки perf'а☆17Sep 4, 2018Updated 7 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- H2HC 2019 Slides/Materials/Presentations☆56Dec 17, 2019Updated 6 years ago
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆16Aug 7, 2019Updated 6 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- CTF box with most tools installed☆89Aug 22, 2018Updated 7 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Rode0day API Client☆18Jan 9, 2019Updated 7 years ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- Mindmaps for threat hunting - work in progress.☆152Mar 15, 2022Updated 3 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Jul 29, 2018Updated 7 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆69Nov 4, 2019Updated 6 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- ☆111Dec 27, 2019Updated 6 years ago