mandiant / VM-Packages
Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.
☆175Updated this week
Alternatives and similar repositories for VM-Packages
Users that are interested in VM-Packages are comparing it to the libraries listed below
Sorting:
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- ☆201Updated 6 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆239Updated last month
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- A C# based tool for analysing malicious OneNote documents☆113Updated 2 years ago
- Repository of Yara Rules☆110Updated last month
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆186Updated last year
- ☆159Updated last year
- Jupyter Notebooks for the Blue Team☆144Updated last month
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆209Updated 2 years ago
- ☆246Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆160Updated last month
- A collection of tools, scripts and personal research☆128Updated last month
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆143Updated 9 months ago
- ☆136Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 4 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 3 months ago
- Initial triage of Windows Event logs☆97Updated 10 months ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- A collection of tools and detections for the Sliver C2 Frameworj☆125Updated 2 years ago
- Dump quarantined files from Windows Defender☆63Updated 3 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A specification and style guide for YARA rules☆48Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆176Updated 3 months ago
- ☆221Updated 3 months ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆61Updated 4 months ago
- Active C&C Detector☆154Updated last year
- MAL-CL (Malicious Command-Line)☆312Updated 2 years ago
- A guide on how to write fast and memory friendly YARA rules☆142Updated 3 months ago