lasq88 / LearingMaterialsLinks
Different learning materials
☆228Updated 5 months ago
Alternatives and similar repositories for LearingMaterials
Users that are interested in LearingMaterials are comparing it to the libraries listed below
Sorting:
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆334Updated 2 weeks ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆368Updated 2 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆654Updated last year
- Jupyter Notebooks for the Blue Team☆146Updated 5 months ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- ☆161Updated 2 years ago
- A ProcessMonitor visualization application written in rust.☆183Updated 2 years ago
- CLI tools for forensic investigation of Windows artifacts☆346Updated last month
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆382Updated last year
- ☆204Updated 10 months ago
- A repository of credential stealer formats☆224Updated 2 months ago
- ☆371Updated this week
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆193Updated last week
- Map tracking ransomware, by OCD World Watch team☆470Updated 5 months ago
- ☆136Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- Research notes☆128Updated 8 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Advanced Bash script designed for conducting digital forensics on Linux systems☆141Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 6 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆107Updated 4 months ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 7 months ago
- A collection of CVEs weaponized by ransomware operators☆121Updated last week
- This repository contains indicators of compromise (IOCs) of our various investigations.☆290Updated this week
- A collection of methods to learn who the owner of an IP address is.☆171Updated 2 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated 11 months ago
- Creation of a laboratory for malware analysis in AWS☆103Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- A GUI and CLI tool for removing bloat from executables☆411Updated last month