mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-12-12 09:34:26 -05:00
Add "Have I Been Emotet" to Malware Analysis
This commit is contained in:
parent
9425f01904
commit
0cd0404466
@ -1385,6 +1385,10 @@ This repository is created as an online bookmark for useful links, resources and
|
||||
<td><a href="https://github.com/GreatSCT/GreatSCT">GreatSCT/GreatSCT</a></td>
|
||||
<td>The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool is intended for BOTH red and blue team</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://haveibeenemotet.com">Have I Been Emotet</a></etd>
|
||||
<td>Check if your email address or domain is involved in the Emotet malspam (name@domain.ext or domain.ext). Your address can be marked as a SENDER (FAKE or REAL), as a RECIPIENT or any combination of the three.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/hasherezade/libpeconv/tree/master/run_pe">hasherezade/libpeconv/runpe</a></td>
|
||||
<td>RunPE (aka Process Hollowing) is a well known technique allowing to injecting a new PE into a remote processes, imprersonating this process. The given implementation works for PE 32bit as well as 64bit.</td>
|
||||
|
Loading…
Reference in New Issue
Block a user