robindimyan / apthowtoLinks
Liberating dem proprietary APT implants
☆20Updated 5 years ago
Alternatives and similar repositories for apthowto
Users that are interested in apthowto are comparing it to the libraries listed below
Sorting:
- ☆23Updated 5 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- ☆60Updated 5 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- ☆36Updated 5 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- ☆11Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- ☆28Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆30Updated 7 years ago
- open source malware analysis and research notes dump☆26Updated last year
- various slides and presentations I've worked on☆19Updated 4 months ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Updated 6 years ago
- ☆20Updated 6 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆52Updated 6 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 4 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago