paulveillard / cybersecurity-malware-analysisLinks
A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.
☆56Updated 2 years ago
Alternatives and similar repositories for cybersecurity-malware-analysis
Users that are interested in cybersecurity-malware-analysis are comparing it to the libraries listed below
Sorting:
- List of some cybersecurity conferences☆58Updated 3 months ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆63Updated 3 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆97Updated 11 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆140Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- Just some lists of Malware Configs☆173Updated 10 months ago
- Sniffing out well-known threat groups☆64Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆110Updated last year
- ☆133Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ☆25Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆18Updated 3 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆172Updated 3 months ago
- Regular Expressions List used in Digital Forensic Tasks☆92Updated 9 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆137Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆14Updated last year
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆46Updated 2 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆90Updated last month
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- A curated list of awesome malware analysis tools and resources☆120Updated 3 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- ☆101Updated 4 years ago
- ☆50Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆98Updated 2 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆72Updated 2 months ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.☆55Updated 10 months ago
- Step-by-step guide to building a custom machine for OSINT activities. The Basic Package includes a robust LINUX system strengthening proc…☆126Updated last year