All binaries file of the PracticalMalwareAnalysis-Labs copied from internet
☆47Aug 30, 2017Updated 8 years ago
Alternatives and similar repositories for PracticalMalwareAnalysis-Labs-Sample
Users that are interested in PracticalMalwareAnalysis-Labs-Sample are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binaries for the book Practical Malware Analysis☆1,463Jun 14, 2022Updated 3 years ago
- Advanced Malware Analysis [video], published by Packt☆22Jan 24, 2023Updated 3 years ago
- Various short scripts and tools used for Digital Forensics☆14Apr 13, 2025Updated 11 months ago
- Solutions to Flare-On 10 CTF☆14Nov 11, 2023Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆246Aug 9, 2023Updated 2 years ago
- Các IDA Flirt signatures HTC tạo☆20Oct 21, 2024Updated last year
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Malware analysis tools used alongside "Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software" Book by Andrew Ho…☆58Jun 3, 2018Updated 7 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated 2 months ago
- The Network File Extractor☆11Feb 27, 2014Updated 12 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- Framework to test Ansible roles with serverspec on multiple systems☆13Mar 7, 2022Updated 4 years ago
- ☆21Nov 19, 2025Updated 4 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆88Mar 11, 2026Updated last week
- CCTV Remote Code Execution Metasploit Module☆10Aug 12, 2016Updated 9 years ago
- Large scale server deploys using BitTorrent and the BitTornado library by Murder (https://github.com/lg/murder)☆30Oct 21, 2013Updated 12 years ago
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- Canari local transforms pcap file analysis☆30Apr 14, 2014Updated 11 years ago
- Active Directory Administration Cookbook, Second Edition, Published by Packt☆25Sep 20, 2023Updated 2 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Jun 21, 2022Updated 3 years ago
- Finding security vulnerabilities with CodeQL in C/C++☆14Mar 25, 2021Updated 4 years ago
- Resources for Cyber Security☆11Oct 30, 2018Updated 7 years ago
- ☆28Feb 7, 2021Updated 5 years ago
- JPCERT/CC public YARA rules repository☆109Mar 9, 2026Updated 2 weeks ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- My experiments in understanding AES, Whitebox AES, and related attacks☆19Oct 11, 2020Updated 5 years ago
- ☆17Jan 22, 2026Updated 2 months ago
- ☆11Jan 9, 2019Updated 7 years ago
- ☆24Feb 10, 2025Updated last year
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Labs for Practical Malware Analysis & Triage☆1,091Feb 23, 2026Updated last month
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Feb 7, 2024Updated 2 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- iOS malware samples☆44May 13, 2016Updated 9 years ago