struppigel / HedgehogLab
Malware Analysis Exercise Samples and Resources
☆40Updated 3 months ago
Alternatives and similar repositories for HedgehogLab:
Users that are interested in HedgehogLab are comparing it to the libraries listed below
- Rules shared by the community from 100 Days of YARA 2024☆83Updated last month
- Malware Samples that could be used for teaching students about malware analysis.☆52Updated 10 months ago
- ☆65Updated 2 years ago
- A specification and style guide for YARA rules☆45Updated 11 months ago
- Jupyter Notebooks for the Blue Team☆144Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- Repository of Yara Rules☆97Updated last month
- Detection Engineering with YARA☆87Updated last year
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆172Updated 3 weeks ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆116Updated last year
- Configuration Extractors for Malware☆89Updated 2 weeks ago
- Free training course offered at Hack Space Con 2023☆137Updated last year
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆164Updated this week
- Research notes☆117Updated 2 months ago
- Elastic Security Labs releases☆57Updated 3 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆121Updated 7 months ago
- Some of my Malware Analysis writeups.☆43Updated last year
- ☆66Updated 2 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- ☆132Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 10 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆58Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆92Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆104Updated last year
- JPCERT/CC public YARA rules repository☆106Updated 2 months ago
- The Windows Malware Analysis Reversing Core Tools☆91Updated 4 years ago
- ☆28Updated this week
- Harness the power of Splunk for your investigations☆87Updated 2 months ago
- A collection of CVEs weaponized by ransomware operators☆104Updated last month
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago