This is the official repository for Basic Malware Analysis Course
☆20Jan 11, 2022Updated 4 years ago
Alternatives and similar repositories for The-Art-of-Malware-Analysis
Users that are interested in The-Art-of-Malware-Analysis are comparing it to the libraries listed below
Sorting:
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- Avocado is a powerful C2 framework written in Python with stageless implants in Rust. Avocado's implant runs seamlessly on both Linux and…☆27Feb 15, 2026Updated 3 weeks ago
- ☆12Apr 5, 2025Updated 11 months ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 6 years ago
- ☆13Jul 15, 2021Updated 4 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 6 months ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- Living Off the Foreign Land setup scripts☆74Feb 26, 2025Updated last year
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- Some of my Malware Analysis writeups☆48Oct 3, 2025Updated 5 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Jul 12, 2023Updated 2 years ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Feb 24, 2026Updated 2 weeks ago
- Open Source and publicly modifiable knowledgebase about CyberSecurity Topics, Concepts, and Terminology. This replaces our prior repo whi…☆26Jan 9, 2025Updated last year
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆60Dec 15, 2023Updated 2 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Sep 1, 2023Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Notes for red teamers - from cloud to Active Directory to many things in between.☆63Jan 7, 2026Updated 2 months ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.☆63Jul 15, 2022Updated 3 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- Backup scripts I use on my drives.☆25Nov 26, 2017Updated 8 years ago
- VSCode extension for the YARA pattern matching language☆63Jan 10, 2024Updated 2 years ago
- All around cracking wordlist.☆31Oct 25, 2023Updated 2 years ago
- Fork of: https://gitweb.torproject.org/user/jvoisin/mat.git☆25Sep 26, 2011Updated 14 years ago
- ☆23Apr 10, 2016Updated 9 years ago
- ☆31Sep 23, 2022Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 3 months ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago