padfoot999 / awesome-malware-analysisLinks
https://github.com/rshipp/awesome-malware-analysis
☆35Updated 5 years ago
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
Sorting:
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- ☆98Updated 3 years ago
- Awesome Honeypot Resource Collection. Including 250+ Honeypot tools, and 350+ posts about Honeypot.☆92Updated 5 years ago
- Resources to help get started with IoT Pentesting☆169Updated 6 years ago
- ☆48Updated 4 years ago
- Endpoint detection & Malware analysis software☆230Updated 5 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Updated 6 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Updated 4 years ago
- ☆27Updated 5 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Linux Incident Response☆90Updated 6 years ago
- ☆86Updated 3 weeks ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 4 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Setup scripts for my Malware Analysis VMs☆256Updated 3 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 4 years ago
- Tools to interact with APTnotes reporting/index.☆104Updated 5 years ago
- Botnet Simulation Framework☆76Updated 5 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆119Updated 6 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year
- Explore Indicators of Compromise Automatically☆97Updated 5 years ago
- ☆48Updated 6 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆176Updated last month
- Your everyday Linux distribution gone Super Saiyan.☆61Updated 2 years ago
- Simple web shell scanner written in Golang.☆89Updated 6 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆65Updated 6 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆110Updated 5 years ago