adam-duby
Interests include reverse engineering, malware data science, malware analysis, cyber threat intelligence, and software security.
USMANew York
Pinned Repositories
APT-Hunter
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
binary-pics
File formats explanations, logos redrawing...
Categorized-Adversary-TTPs
Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-technique pivoting.
ControlCompass.github.io
Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques
CTF-Challenges
A Series of CTF Challenges I created
cuckoo-malware-dataset
A repository of malware reports generated from the Cuckoo sandbox.
CYBR215
For Norwich University CYBR215 Course
DLL_Injection_Example
Example of DLL Injection via CreateRemoteThread.
Extending-Threat-Playbooks-for-APT-Attribution
A GitHub Repository with code for a research paper published in ISDFS 2023.
Malware-Training
Malware Training
adam-duby's Repositories
adam-duby/CTF-Challenges
A Series of CTF Challenges I created
adam-duby/Malware-Training
Malware Training
adam-duby/APT-Hunter
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
adam-duby/binary-pics
File formats explanations, logos redrawing...
adam-duby/Categorized-Adversary-TTPs
Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-technique pivoting.
adam-duby/ControlCompass.github.io
Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques
adam-duby/cuckoo-malware-dataset
A repository of malware reports generated from the Cuckoo sandbox.
adam-duby/CYBR215
For Norwich University CYBR215 Course
adam-duby/DLL_Injection_Example
Example of DLL Injection via CreateRemoteThread.
adam-duby/Extending-Threat-Playbooks-for-APT-Attribution
A GitHub Repository with code for a research paper published in ISDFS 2023.
adam-duby/Getting-All-The-Imports-Tool
5 - Getting all the Imports - We have seen numerous ways to statically extract a list of imports from the IAT. However, explicitly delay loaded functions are absent from these lists. Develop a tool that can statically capture ALL loaded DLLs and imports, included those from emebedded exes, and potentially obfuscated imports.
adam-duby/Groupings
adam-duby/lighthouse
Code Coverage Explorer for IDA Pro & Binary Ninja
adam-duby/Lightweight-Dynamic-Features
Research project for LDF
adam-duby/Linux-Code-Samples
adam-duby/mbcscan
Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.
adam-duby/Practice-Samples
Practice RE samples
adam-duby/publications
Research pubs
adam-duby/RSA-Training
adam-duby/Samples
Samples
adam-duby/vx-underground-pull