11 results for “topic:remnux”
Menú de herramientas para análisis de malware y virus informáticos.
Complete Claude skills toolkit for professional malware analysis. 5 specialized skills covering triage, dynamic analysis, detection engineering, and reporting. Works with REMnux/FlareVM offline environments.
This project focuses on static and dynamic malware analysis using REMnux and FlareVM. It involves setting up analysis environments on both platforms to examine malware behavior, dissect malicious code, and understand threat vectors. Goals: enhance malware detection, improve analysis techniques, and strengthen overall cybersecurity defenses.
Spin up a fully configured, host‑only malware analysis lab with FlareVM and REMnux using a few repeatable commands.
Static and behavioral malware analysis of LokiBot using FlareVM, REMnux, VirusTotal, and Hybrid Analysis. Includes MITRE ATT&CK mapping and prevention guidance.
This repository contains two static malware analysis labs: one exploring Emotet using VirusTotal and Hybrid Analysis, and another focused on keylogger dissection using REMnux and PEStudio.
PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.
This project uses REMnux and FlareVM for static and dynamic malware analysis, setting up secure environments to study malware behavior, dissect malicious code, and understand threat vectors. The goal is to improve detection, refine analysis skills, and strengthen overall cybersecurity defenses.
This repository contains Dockerfile for the remnux-sift Docker image published in the Docker Hub: https://hub.docker.com/r/yara0/remnux-sift
Digital Forensics & Incident Response — tools, notes and investigations
A structured malware analysis lab covering static analysis, dynamic behavioral analysis, memory forensics, and detection engineering with Sigma and Wazuh.