CYB3RMX / MalwareHashDB
Malware hashes for open source projects.
☆75Updated last week
Related projects: ⓘ
- Some malware samples or suspicious files I found and their reports.☆35Updated 2 years ago
- An super lightweight utility for creating bootable USB drives.☆23Updated 3 years ago
- IoC Feed for security analysts etc.☆13Updated last year
- This repository contains indicators of compromise (IOCs) of our various investigations.☆205Updated 4 months ago
- ☆42Updated 5 months ago
- Open Source Cyber Threat Intelligence Feed Collector☆15Updated 3 years ago
- Notes and IoCs of fresh malware☆58Updated 2 months ago
- ☆63Updated last year
- A scapy based module for programming offensive and defensive networking tools easier than before.☆17Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 2 weeks ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆30Updated 2 years ago
- ⚠️ Malware Development training ⚠️☆25Updated last week
- Hive v5 file decryption algorithm☆34Updated last year
- A simple arp spoof script written with python☆16Updated 4 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆57Updated 8 months ago
- IoT device scanner with CVE database and many features.☆13Updated 5 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆32Updated 2 years ago
- ☆18Updated this week
- ☆296Updated this week
- ☆60Updated this week
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆20Updated 2 years ago
- [MAF - Malware Analysis Feed] This repository aim to collect useful scripts and rules for the detection of malware families analyzed by Z…☆20Updated 6 months ago
- Chista | Open Threat Intelligence Framework☆51Updated 4 months ago
- ☆95Updated 6 months ago
- ☆20Updated last month
- A specification and style guide for YARA rules☆34Updated 7 months ago
- ☆24Updated 3 years ago
- Repository of Yara Rules☆83Updated last week
- Malware Samples that could be used for teaching students about malware analysis.☆45Updated 5 months ago
- ☆27Updated 3 years ago