struppigel / HedgehogLab
Malware Analysis Exercise Samples and Resources
☆41Updated 5 months ago
Alternatives and similar repositories for HedgehogLab:
Users that are interested in HedgehogLab are comparing it to the libraries listed below
- A specification and style guide for YARA rules☆47Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 3 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆145Updated 3 weeks ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- ☆66Updated 2 years ago
- Dump quarantined files from Windows Defender☆63Updated 3 years ago
- macOS Artifacts☆29Updated last month
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆90Updated this week
- Some of my Malware Analysis writeups.☆44Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated last year
- The Windows Malware Analysis Reversing Core Tools☆94Updated 4 years ago
- Knowledge base for reverse engineering and malware analysis☆11Updated 3 months ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆61Updated 3 months ago
- Creation of a laboratory for malware analysis in AWS☆95Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Detection Engineering with YARA☆87Updated last year
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆193Updated last month
- CarbonBlack EDR detection rules and response actions☆71Updated 7 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 2 months ago
- Malware Analysis Techniques, published by Packt☆69Updated 2 years ago
- ☆68Updated 4 months ago
- ☆65Updated 2 years ago
- ☆113Updated last month
- Quick analysis focusing on most important of a Malware or a Threat☆40Updated last year
- ☆33Updated last week
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆174Updated this week
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆46Updated 11 months ago