pan-unit42 / wireshark-tutorial-Emotet-trafficView external linksLinks
This repository contains zip archives of pcaps for our Wireshark tutorial about examining Emotet infection traffic. The password for any of the zip files posted here is: infected
☆25Jan 11, 2021Updated 5 years ago
Alternatives and similar repositories for wireshark-tutorial-Emotet-traffic
Users that are interested in wireshark-tutorial-Emotet-traffic are comparing it to the libraries listed below
Sorting:
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Oct 8, 2020Updated 5 years ago
- Simple utility to watch directory change notifications on a given path☆19Oct 6, 2017Updated 8 years ago
- pcaps of traffic for traffic analysis workshop☆93Oct 3, 2021Updated 4 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 5 years ago
- ☆129Jan 29, 2024Updated 2 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 5 years ago
- Triaging Windows event logs based on SANS Poster☆46Nov 22, 2025Updated 2 months ago
- ☆99Aug 14, 2020Updated 5 years ago
- WIP python3 plugin for x64dbg☆16Mar 31, 2021Updated 4 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- A new idea to build an anti ransomware☆24Oct 4, 2020Updated 5 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- The windows kernel ssdt hook demo☆16Nov 5, 2018Updated 7 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 4 years ago
- ☆21Apr 2, 2024Updated last year
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- ☆16Apr 30, 2024Updated last year
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Feb 24, 2021Updated 4 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 4 months ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 7 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- Writing WDF Drivers I: Core Concepts Lab Material☆53Jul 5, 2023Updated 2 years ago
- ☆66May 13, 2022Updated 3 years ago
- ☆24Mar 4, 2019Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Mar 30, 2019Updated 6 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- My Malware Analysis Reports☆25May 24, 2022Updated 3 years ago
- QuasarRAT analysis tools and research report☆29Dec 22, 2023Updated 2 years ago
- Static unpacker for FinSpy VM☆103Jul 11, 2021Updated 4 years ago
- penter hook example and driver time recorder☆31Oct 2, 2017Updated 8 years ago
- Plugin to label PEB addresses.☆31Feb 28, 2017Updated 8 years ago
- ☆76Nov 30, 2023Updated 2 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- A minifilter driver for detecting and blocking ransomware virus☆27Mar 4, 2018Updated 7 years ago