msuiche / OPCDE
OPCDE Cybersecurity Conference Materials
☆610Updated 4 years ago
Alternatives and similar repositories for OPCDE:
Users that are interested in OPCDE are comparing it to the libraries listed below
- rVMI - A New Paradigm For Full System Analysis☆353Updated 7 years ago
- Various snippets created during malware analysis☆458Updated 2 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,036Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,253Updated 4 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,136Updated last year
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 4 years ago
- Ephemera and other documentation associated with the 1337list project.☆396Updated 6 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆230Updated 3 weeks ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,160Updated 4 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆462Updated 3 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆390Updated 8 years ago
- FAME Automates Malware Evaluation☆878Updated 2 months ago
- ☆1,057Updated 5 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆890Updated 9 months ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Updated 3 years ago
- A Course on Intermediate Level Linux Exploitation☆990Updated 4 years ago
- Malware Configuration And Payload Extraction☆748Updated last month
- Interactive shellcoding environment to easily craft shellcodes☆894Updated 3 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,593Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆826Updated 7 years ago
- 16,432 Free Yara rules created by☆382Updated 5 years ago
- A collection of sources of indicators of compromise.☆826Updated 3 months ago
- Collaborative malware analysis framework☆376Updated 5 years ago
- Red Team Tactics, Techniques, and Procedures☆395Updated last month
- Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.☆640Updated last month