Cisco-Talos / Mussels
☆53Updated 3 months ago
Alternatives and similar repositories for Mussels:
Users that are interested in Mussels are comparing it to the libraries listed below
- Geppetto - Virtual machine and infrastructure orchestration☆13Updated 2 months ago
- Dragon Sandbox☆78Updated 12 years ago
- A curated list of awesome malware analysis tools and resources☆21Updated 7 years ago
- The pattern matching swiss knife☆15Updated 5 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- Yara rules for detecting malware☆23Updated 7 months ago
- Malquarium - Modern Malware Repository☆47Updated this week
- BASS - BASS Automated Signature Synthesizer☆175Updated 6 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 3 months ago
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- ☆68Updated 7 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆34Updated 3 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- pcapdj - dispatch pcap files☆45Updated 4 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- Passive DHCP fingerprinting implementation☆51Updated 8 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- ☆49Updated last year
- Indicators of Compromise (IOCs) for malware we have researched☆11Updated last year
- Commandline utility to interact with the Malpedia service☆22Updated 5 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 3 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆83Updated last year
- Exploit, Malware and Vulnerability Scoring Application☆13Updated last year
- Javascript deobfuscation tool☆17Updated 7 years ago
- Yara rules for malware families seen as part of targeted threats project☆137Updated 8 years ago