paulveillard / cybersecurity-malware-analysisLinks
A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.
☆56Updated 2 years ago
Alternatives and similar repositories for cybersecurity-malware-analysis
Users that are interested in cybersecurity-malware-analysis are comparing it to the libraries listed below
Sorting:
- List of some cybersecurity conferences☆58Updated 4 months ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆101Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆73Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆171Updated 4 months ago
- Just some lists of Malware Configs☆173Updated last year
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆62Updated 3 years ago
- Regular Expressions List used in Digital Forensic Tasks☆92Updated 10 months ago
- Ransomware groups posts☆43Updated this week
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆95Updated last month
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆136Updated 2 years ago
- Step-by-step guide to building a custom machine for OSINT activities. The Basic Package includes a robust LINUX system strengthening proc…☆126Updated last year
- Sniffing out well-known threat groups☆64Updated last year
- ☆132Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 4 months ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆39Updated 2 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆111Updated last year
- The best tools and resources for forensic analysis.☆167Updated 2 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆45Updated 2 years ago
- ☆102Updated 4 years ago
- ☆25Updated 2 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 10 months ago
- A curated list of awesome malware analysis tools and resources☆123Updated 4 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆29Updated last year