silascutler / awesome-docker-malware-analysisView external linksLinks
Repository of tools and resources for analyzing Docker containers
☆72Nov 20, 2023Updated 2 years ago
Alternatives and similar repositories for awesome-docker-malware-analysis
Users that are interested in awesome-docker-malware-analysis are comparing it to the libraries listed below
Sorting:
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44May 2, 2025Updated 9 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- A Golang CLI for the MITRE ATT&CK Framework☆14Apr 28, 2025Updated 9 months ago
- ☆23Mar 17, 2024Updated last year
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Dec 21, 2022Updated 3 years ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- Windows file metadata / forensic tool.☆18Oct 12, 2025Updated 4 months ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆26Sep 24, 2025Updated 4 months ago
- Jar2Exe extraction tool☆15Dec 28, 2022Updated 3 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128May 28, 2024Updated last year
- The Outlook HTML Leak Test Project☆131May 12, 2018Updated 7 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Keep it secret, keep it safe☆80Feb 6, 2025Updated last year
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Aug 23, 2025Updated 5 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Jun 23, 2025Updated 7 months ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- ☆25Aug 25, 2015Updated 10 years ago
- ☆22Aug 29, 2024Updated last year
- Agentic LLM CTF to test prompt injection attacks and preventions☆27Feb 2, 2026Updated last week
- Yet another shellcode loader - but a sneaky one☆25Apr 16, 2025Updated 9 months ago
- Python tool to resolve all strings in Go binaries obfuscated by garble☆188Feb 21, 2025Updated 11 months ago
- Cross platform GitHub Action to upload multiple assets to a release using Golang☆12Feb 6, 2026Updated last week
- Quick ESXi Log Parser☆28Oct 20, 2025Updated 3 months ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- Malware traffic obfuscation library☆39Jul 24, 2025Updated 6 months ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆52Sep 24, 2025Updated 4 months ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆633Aug 4, 2025Updated 6 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated 3 weeks ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- ☆227Sep 8, 2022Updated 3 years ago