Droogy / MalgetLinks
A personal malware feed which downloads and classifies the latest samples from Malshare.
☆22Updated 3 years ago
Alternatives and similar repositories for Malget
Users that are interested in Malget are comparing it to the libraries listed below
Sorting:
- Hatching Triage public command-line utility and API library.☆70Updated last year
- ☆35Updated 3 years ago
- ☆96Updated 3 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Updated 3 years ago
- ☆130Updated last year
- Notes and IoCs of fresh malware☆59Updated last year
- Python API for interacting with sigma rules.☆55Updated 3 years ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆63Updated 7 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- ☆128Updated 6 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆149Updated 2 years ago
- VirusTotal Intelligence Search☆38Updated 5 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆183Updated 4 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆169Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆181Updated last month
- The Windows Malware Analysis Reversing Core Tools☆96Updated 4 years ago
- IOC Collection 2022☆57Updated 2 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆140Updated 2 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆134Updated last year
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆86Updated 2 years ago
- Yara Based Detection Engine for web browsers☆49Updated 3 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Standardized Malware Analysis Tool☆53Updated 4 years ago