Repository of tools and resources for analyzing Docker containers
☆72Nov 20, 2023Updated 2 years ago
Alternatives and similar repositories for awesome-docker-malware-analysis
Users that are interested in awesome-docker-malware-analysis are comparing it to the libraries listed below
Sorting:
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 10 months ago
- An another JWT cracker but really fast!☆11Jan 26, 2023Updated 3 years ago
- Python Library for ConfigExtractor☆15Feb 24, 2026Updated last week
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆168Sep 7, 2024Updated last year
- ☆13Jun 14, 2024Updated last year
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- A Golang CLI for the MITRE ATT&CK Framework☆14Apr 28, 2025Updated 10 months ago
- Yet Another Memory Analyzer for malware detection☆203Apr 8, 2025Updated 10 months ago
- ☆23Mar 17, 2024Updated last year
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆65Dec 21, 2022Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- Jar2Exe extraction tool☆15Dec 28, 2022Updated 3 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆26Sep 24, 2025Updated 5 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127May 28, 2024Updated last year
- ☆17May 27, 2023Updated 2 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Canary Detection☆190Oct 20, 2025Updated 4 months ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Sep 19, 2022Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Jun 23, 2025Updated 8 months ago
- ☆24Aug 25, 2015Updated 10 years ago
- Agentic LLM CTF to test prompt injection attacks and preventions☆28Feb 25, 2026Updated last week
- Script to parse Process Monitor XML log file, and give you a summary report.☆23May 4, 2016Updated 9 years ago
- Yet another shellcode loader - but a sneaky one☆25Apr 16, 2025Updated 10 months ago
- ☆22Aug 29, 2024Updated last year
- Radare2 Metadata Extraction to Elasticsearch☆23May 21, 2024Updated last year
- Applied data science in cyber security☆23Mar 21, 2022Updated 3 years ago
- Quick ESXi Log Parser☆29Oct 20, 2025Updated 4 months ago
- Malware traffic obfuscation library☆37Jul 24, 2025Updated 7 months ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- Cross platform GitHub Action to upload multiple assets to a release using Golang☆12Feb 6, 2026Updated last month
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month