paulveillard / cybersecurity-malware-analysisLinks
A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.
☆56Updated 2 years ago
Alternatives and similar repositories for cybersecurity-malware-analysis
Users that are interested in cybersecurity-malware-analysis are comparing it to the libraries listed below
Sorting:
- List of some cybersecurity conferences☆58Updated 3 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆98Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆93Updated 2 weeks ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆62Updated 3 years ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆111Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆171Updated 3 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆140Updated 2 years ago
- Regular Expressions List used in Digital Forensic Tasks☆91Updated 10 months ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆37Updated 2 years ago
- Sniffing out well-known threat groups☆64Updated last year
- ☆133Updated 2 years ago
- Just some lists of Malware Configs☆173Updated 11 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Ransomware groups posts☆43Updated this week
- a curated, categorised collection of useful projects 👨👩👧☆123Updated 3 weeks ago
- ☆25Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆40Updated 2 years ago
- A curated list of awesome malware analysis tools and resources☆121Updated 3 years ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆37Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆15Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆136Updated 2 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 10 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- The best tools and resources for forensic analysis.☆165Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆46Updated 2 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆29Updated last year