CYB3RMX / MalwareHashDB
Malware hashes for open source projects.
☆77Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for MalwareHashDB
- Some malware samples or suspicious files I found and their reports.☆36Updated 2 years ago
- An super lightweight utility for creating bootable USB drives.☆23Updated 3 years ago
- Repository of Yara Rules☆88Updated last month
- This repository contains indicators of compromise (IOCs) of our various investigations.☆207Updated 6 months ago
- ☆64Updated last year
- IoC Feed for security analysts etc.☆13Updated last year
- ☆43Updated 7 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 2 months ago
- Open Source Cyber Threat Intelligence Feed Collector☆15Updated 3 years ago
- IoT device scanner with CVE database and many features.☆13Updated 5 years ago
- A scapy based module for programming offensive and defensive networking tools easier than before.☆17Updated 3 years ago
- Hive v5 file decryption algorithm☆34Updated last year
- ☆309Updated this week
- Notes and IoCs of fresh malware☆59Updated 4 months ago
- Just another collection of links, tools, reports and other stuff☆20Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆53Updated 6 months ago
- ☆25Updated 3 years ago
- Collection of rules created using YARA-Signator over Malpedia☆112Updated last week
- A specification and style guide for YARA rules☆37Updated 9 months ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆33Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated 10 months ago
- Collection of YARA rules designed for usage through VirusTotal.com.☆65Updated 7 months ago
- A simple arp spoof script written with python☆16Updated 4 years ago
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆48Updated 7 months ago
- Configuration Extractors for Malware☆54Updated last month
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 2 years ago
- ⚠️ Malware Development training ⚠️☆29Updated 2 months ago