paulveillard / cybersecurity-malware-analysisView external linksLinks
A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.
☆58Mar 4, 2023Updated 2 years ago
Alternatives and similar repositories for cybersecurity-malware-analysis
Users that are interested in cybersecurity-malware-analysis are comparing it to the libraries listed below
Sorting:
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆18Feb 29, 2024Updated last year
- A collection of CTF frameworks, libraries, resources, softwares and tutorials, books, resources and cool stuff in Cybersecurity☆17Dec 11, 2021Updated 4 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- ☆16Mar 6, 2019Updated 6 years ago
- A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science stu…☆19Mar 6, 2022Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆61Jan 6, 2023Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- A curated list of awesome malware analysis tools and resources☆137Jan 8, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆43Jun 28, 2022Updated 3 years ago
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Dec 16, 2021Updated 4 years ago
- Goby-Poc-Collection for Goby scanner https://github.com/gobysec/Goby - forked from many github accounts Thanks the authors☆12Dec 10, 2023Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆51Jan 6, 2024Updated 2 years ago
- anything I find interesting regarding reverse engineering☆13May 7, 2017Updated 8 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 2 years ago
- 一个用于修改右键插件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.☆35Apr 20, 2025Updated 9 months ago
- ☆16Mar 22, 2023Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Jun 29, 2021Updated 4 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 2 years ago
- An ongoing collection of Python language tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practica…☆14Jan 15, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jul 5, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 3 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆19Nov 26, 2025Updated 2 months ago
- Using plotly to perfom data visualization of ransomware leak site data☆14Feb 15, 2024Updated last year
- ☆19Jul 29, 2022Updated 3 years ago
- ☆15Feb 22, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆21Feb 24, 2024Updated last year
- Tracking and documenting monthly insights about hacktivist coalitions.☆22Sep 14, 2025Updated 4 months ago
- Reaper of screencast videos for OSINT purposes☆20Apr 12, 2024Updated last year
- This is a repo for cybersecurity analyst collecting artifacts in a incident response case.☆19Feb 17, 2025Updated 11 months ago
- IOC/Hash scanner and IDS layer 4 designed to be portable and fast☆27Jan 28, 2026Updated 2 weeks ago
- A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team …☆49Dec 19, 2022Updated 3 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆22Jan 1, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆89Oct 9, 2024Updated last year