nikhilh-20 / ELFENLinks
ELFEN: Automated Linux Malware Analysis Sandbox
☆126Updated 3 weeks ago
Alternatives and similar repositories for ELFEN
Users that are interested in ELFEN are comparing it to the libraries listed below
Sorting:
- Repository of Yara Rules☆115Updated 5 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- Configuration Extractors for Malware☆113Updated 4 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A ProcessMonitor visualization application written in rust.☆183Updated 2 years ago
- ☆113Updated 2 months ago
- ☆136Updated 2 years ago
- ☆66Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆160Updated last year
- Powershell Linter☆83Updated last week
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆70Updated 3 weeks ago
- Some of my Malware Analysis writeups☆46Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆38Updated last year
- A C# based tool for analysing malicious OneNote documents☆116Updated 2 years ago
- Python tool to check rootkits in Windows kernel☆201Updated 3 weeks ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- Linpmem is a linux memory acquisition tool☆87Updated 2 months ago
- Linux #rootkit and #malware revealer☆27Updated last year
- ☆55Updated 11 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated 11 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 8 months ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆72Updated 9 months ago
- ☆82Updated 9 months ago
- A Repository to Track Anti-Forensic Techniques☆112Updated 2 years ago
- Yara Rules for Modern Malware☆79Updated last year