Adam's repositories
Malware-Training
Malware Training
APT-Hunter
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
binary-pics
File formats explanations, logos redrawing...
Categorized-Adversary-TTPs
Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-technique pivoting.
ControlCompass.github.io
Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques
cuckoo-malware-dataset
A repository of malware reports generated from the Cuckoo sandbox.
DLL_Injection_Example
Example of DLL Injection via CreateRemoteThread.
Extending-Threat-Playbooks-for-APT-Attribution
A GitHub Repository with code for a research paper published in ISDFS 2023.
Getting-All-The-Imports-Tool
5 - Getting all the Imports - We have seen numerous ways to statically extract a list of imports from the IAT. However, explicitly delay loaded functions are absent from these lists. Develop a tool that can statically capture ALL loaded DLLs and imports, included those from emebedded exes, and potentially obfuscated imports.
lighthouse
Code Coverage Explorer for IDA Pro & Binary Ninja
Lightweight-Dynamic-Features
Research project for LDF
mbcscan
Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.
Practice-Samples
Practice RE samples
publications
Research pubs
Samples
Samples