You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Complete Claude skills toolkit for professional malware analysis. 5 specialized skills covering triage, dynamic analysis, detection engineering, and reporting. Works with REMnux/FlareVM offline environments.
This project focuses on static and dynamic malware analysis using REMnux and FlareVM. It involves setting up analysis environments on both platforms to examine malware behavior, dissect malicious code, and understand threat vectors. Goals: enhance malware detection, improve analysis techniques, and strengthen overall cybersecurity defenses.
This repository contains two static malware analysis labs: one exploring Emotet using VirusTotal and Hybrid Analysis, and another focused on keylogger dissection using REMnux and PEStudio.
Static and behavioral malware analysis of LokiBot using FlareVM, REMnux, VirusTotal, and Hybrid Analysis. Includes MITRE ATT&CK mapping and prevention guidance.
PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.
This project uses REMnux and FlareVM for static and dynamic malware analysis, setting up secure environments to study malware behavior, dissect malicious code, and understand threat vectors. The goal is to improve detection, refine analysis skills, and strengthen overall cybersecurity defenses.
A structured malware analysis lab covering static analysis, dynamic behavioral analysis, memory forensics, and detection engineering with Sigma and Wazuh.