CYB3RMX / MalwareHashDBLinks
Malware hashes for open source projects.
☆84Updated last year
Alternatives and similar repositories for MalwareHashDB
Users that are interested in MalwareHashDB are comparing it to the libraries listed below
Sorting:
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- This repository contains indicators of compromise (IOCs) of our various investigations.☆310Updated 2 months ago
- Repository of Yara Rules☆138Updated last week
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆66Updated 2 weeks ago
- Collection of rules created using YARA-Signator over Malpedia☆143Updated 3 weeks ago
- ☆67Updated 3 years ago
- Live malware samples and database, daily update.☆31Updated 9 months ago
- ☆380Updated 2 weeks ago
- Python scripts for Malware Bazaar☆157Updated last year
- Some malware samples or suspicious files I found and their reports.☆37Updated 4 years ago
- Malware Sandboxes & Malware Source☆108Updated 8 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated 2 years ago
- Dynamic and static analysis with Real Time Malware/Executable Analysis Platform for Windows, including open-source XDR (2 EDR projects), …☆142Updated this week
- Notes and IoCs of fresh malware☆59Updated last year
- IoC Feed for security analysts etc.☆13Updated 2 years ago
- ☆151Updated 3 months ago
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- Just some lists of Malware Configs☆173Updated last year
- Collection of YARA rules designed for usage through VirusTotal.com.☆84Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- ☆52Updated 5 months ago
- Collection of private Yara rules.☆378Updated this week
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- File analysis and management framework.☆92Updated 2 years ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆248Updated last year
- Advanced static analysis tool☆106Updated 3 weeks ago
- Resources for learning malware analysis and reverse engineering☆143Updated last year
- ☆194Updated last year
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆134Updated 5 months ago