itaymigdal / malware-analysis-writeups
Some of my Malware Analysis writeups.
☆43Updated last year
Alternatives and similar repositories for malware-analysis-writeups:
Users that are interested in malware-analysis-writeups are comparing it to the libraries listed below
- Configuration Extractors for Malware☆94Updated 2 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated 11 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Repository of Yara Rules☆103Updated last month
- ☆80Updated 4 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- C2 Active Scanner☆55Updated 9 months ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆61Updated 3 months ago
- Yara Rules for Modern Malware☆75Updated last year
- ☆66Updated 2 years ago
- ☆31Updated this week
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- ☆37Updated last year
- Quick analysis focusing on most important of a Malware or a Threat☆40Updated last year
- A specification and style guide for YARA rules☆47Updated last year
- Powershell Linter☆50Updated this week
- ☆22Updated 10 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 9 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 3 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 10 months ago
- ☆20Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆27Updated 9 months ago
- The Windows Malware Analysis Reversing Core Tools☆92Updated 4 years ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 7 months ago
- Contains compiled binaries of Volatility☆33Updated 2 months ago
- ☆84Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆52Updated this week
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆15Updated 2 years ago
- ☆71Updated last year