paulveillard / cybersecurity-malware-analysisLinks
A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.
☆51Updated 2 years ago
Alternatives and similar repositories for cybersecurity-malware-analysis
Users that are interested in cybersecurity-malware-analysis are comparing it to the libraries listed below
Sorting:
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 2 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆157Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- List of some cybersecurity conferences☆57Updated last week
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆138Updated 2 years ago
- Just some lists of Malware Configs☆172Updated 7 months ago
- ☆135Updated last year
- Regular Expressions List used in Digital Forensic Tasks☆88Updated 6 months ago
- A curated list of awesome malware analysis tools and resources☆97Updated 3 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆83Updated 3 weeks ago
- The best tools and resources for forensic analysis.☆164Updated 2 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆106Updated last year
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆97Updated 8 months ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆32Updated 2 years ago
- Sniffing out well-known threat groups☆52Updated last year
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- Capture screenshots of onion services on an onion service.☆71Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆86Updated 3 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆67Updated last year
- Ransomware groups posts☆40Updated this week
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆46Updated 2 years ago
- ☆149Updated 2 years ago
- ☆98Updated 3 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆131Updated last year
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆45Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆247Updated this week
- OSINT Tools for the Dark Web☆162Updated 5 months ago
- Tools & Resources for Cyber Security Operations☆248Updated 3 months ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago