DanusMinimus / MalwareLakeLinks
A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tools
☆28Updated 5 years ago
Alternatives and similar repositories for MalwareLake
Users that are interested in MalwareLake are comparing it to the libraries listed below
Sorting:
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- Standardized Malware Analysis Tool☆53Updated 4 years ago
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆13Updated 4 years ago
- Python based CLI for MalwareBazaar☆37Updated last month
- A collection of my public YARA signatures for various malware families☆29Updated 11 months ago
- Tools for assisting the reverse engineering of Qakbot☆11Updated 4 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 3 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Updated 4 years ago
- Collection of YARA signatures from individual research☆44Updated last year
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- ☆15Updated 3 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Updated 7 months ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Updated 4 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Updated 3 years ago
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- ☆25Updated 2 years ago
- Client library for the mwdb service by CERT Polska.☆40Updated last month
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆21Updated 3 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- ☆22Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 5 years ago
- VirusTotal Intelligence Search☆38Updated 5 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆86Updated 2 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 5 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year