padfoot999 / awesome-malware-analysis
https://github.com/rshipp/awesome-malware-analysis
☆33Updated 3 years ago
Related projects: ⓘ
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆76Updated 2 years ago
- OSCP guide and Red Team assessment Guide☆33Updated 4 years ago
- Linux Persistence Toolkit☆44Updated last year
- ☆69Updated this week
- ☆62Updated this week
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆88Updated 5 years ago
- ☆45Updated 5 years ago
- Notes and IoCs of fresh malware☆58Updated 2 months ago
- ☆103Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Easy to configure Honeypot for Blue Team☆39Updated 3 months ago
- Commands used in Windows penetration tests☆48Updated 2 years ago
- ☆86Updated this week
- PenTest Methodology☆11Updated last year
- Functions that can be used to gain Reverse Shells with PowerShell☆79Updated 2 years ago
- ☆106Updated 4 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆79Updated last year
- Simulating Adversary Operations☆93Updated 6 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 3 years ago
- Windows for Red Teamers☆123Updated 2 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆31Updated 6 years ago
- An advanced graphical search engine for Exploit-DB☆116Updated 3 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆91Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 4 years ago
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆71Updated last week
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆107Updated 2 years ago
- ☆29Updated this week
- ☆62Updated 5 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆39Updated 2 years ago