☆15Nov 25, 2021Updated 4 years ago
Alternatives and similar repositories for MDIExtractor
Users that are interested in MDIExtractor are comparing it to the libraries listed below
Sorting:
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Feb 26, 2026Updated 3 weeks ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- ☆15Apr 8, 2023Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Feb 15, 2022Updated 4 years ago
- ☆32Apr 24, 2022Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- Adversary Simulation Framework☆38Aug 19, 2025Updated 7 months ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated 2 months ago
- Nacos下Spring-Cloud-Gateway CVE-2022-22947利用环境☆16Jun 25, 2022Updated 3 years ago
- OpenCTI Documentation Space☆26Dec 18, 2025Updated 3 months ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- ☆64Apr 1, 2021Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆132Nov 25, 2023Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 10 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- ☆19Jul 23, 2019Updated 6 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- Lazarus analysis tools and research report☆57Dec 22, 2023Updated 2 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 6 months ago
- A set of tools for collecting forensic information☆27Apr 4, 2020Updated 5 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- MSIX Building Made Easy for Defenders☆64Aug 25, 2025Updated 6 months ago
- Python bindings for the Zydis disassembler library☆17Jul 2, 2019Updated 6 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago