All binaries file of the PracticalMalwareAnalysis-Labs copied from internet
☆47Aug 30, 2017Updated 8 years ago
Alternatives and similar repositories for PracticalMalwareAnalysis-Labs-Sample
Users that are interested in PracticalMalwareAnalysis-Labs-Sample are comparing it to the libraries listed below
Sorting:
- Binaries for the book Practical Malware Analysis☆1,453Jun 14, 2022Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Various short scripts and tools used for Digital Forensics☆14Apr 13, 2025Updated 10 months ago
- Solutions to Flare-On 10 CTF☆14Nov 11, 2023Updated 2 years ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- Advanced Malware Analysis [video], published by Packt☆22Jan 24, 2023Updated 3 years ago
- Malware analysis tools used alongside "Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software" Book by Andrew Ho…☆58Jun 3, 2018Updated 7 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 3 months ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆55Updated this week
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Dec 17, 2025Updated 2 months ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- https://github.com/rshipp/awesome-malware-analysis☆35Oct 1, 2020Updated 5 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- TA505 unpacker Python 2.7☆46Jun 22, 2020Updated 5 years ago
- Find tools that will help you with your OSINT investigations, from auditing, screen recording to aggregation. Add then to your OSINT Tool…☆50Jan 4, 2026Updated 2 months ago
- Repository resource for threat hunter☆158Sep 14, 2018Updated 7 years ago
- Two factor authentication through an Ethereum contract.☆12Aug 31, 2017Updated 8 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- ☆12Feb 11, 2024Updated 2 years ago
- Deprecated version of Explorer☆11Mar 31, 2022Updated 3 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- 🔐 AES 256 GCM encryption algorithm in Dart☆12Dec 17, 2021Updated 4 years ago
- A repo that contains a recursive dump from the ROOT key of every Windows Registry hive (using KAPE) from a vanilla (clean) install of eve…☆53Oct 29, 2025Updated 4 months ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Various Atlassian Confluence related tools☆19Feb 19, 2026Updated last week
- ☆11Jun 30, 2020Updated 5 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago