rivitna / Malware
☆348Updated this week
Alternatives and similar repositories for Malware:
Users that are interested in Malware are comparing it to the libraries listed below
- Just some lists of Malware Configs☆169Updated 2 months ago
- ☆158Updated last year
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆347Updated last week
- CLI tools for forensic investigation of Windows artifacts☆326Updated 4 months ago
- A ProcessMonitor visualization application written in rust.☆177Updated last year
- Different learning materials☆226Updated last week
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆170Updated this week
- A repository of credential stealer formats☆202Updated this week
- ☆195Updated last year
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆330Updated 7 months ago
- A centralized and enhanced memory analysis platform☆434Updated last month
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆641Updated this week
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆359Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆183Updated 3 months ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆242Updated last week
- Python tool to check rootkits in Windows kernel☆195Updated 3 weeks ago
- ☆120Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆293Updated 7 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆139Updated 6 months ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆634Updated 8 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆147Updated 6 months ago
- Analyse your malware to surgically obfuscate it☆456Updated 3 weeks ago
- Repository of Yara Rules☆103Updated last month
- Configuration Extractors for Malware☆93Updated last month
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆158Updated last month
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆185Updated last month
- Jupyter Notebooks for the Blue Team☆145Updated this week
- Gets updates from various clearnet domains and ransomware threat actor domains☆385Updated 11 months ago
- Free training course offered at Hack Space Con 2023☆138Updated last year
- ☆134Updated last year