Droogy / MalgetLinks
A personal malware feed which downloads and classifies the latest samples from Malshare.
☆23Updated 4 years ago
Alternatives and similar repositories for Malget
Users that are interested in Malget are comparing it to the libraries listed below
Sorting:
- Hatching Triage public command-line utility and API library.☆72Updated 2 years ago
- ☆96Updated 5 months ago
- ☆131Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆88Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Updated last year
- Collection of YARA signatures from individual research☆46Updated last year
- Valhalla API Client☆70Updated 2 years ago
- ☆27Updated 2 months ago
- Standardized Malware Analysis Tool☆55Updated 4 years ago
- Active C2 IoCs☆99Updated 2 years ago
- Learning volatility plugins.☆19Updated 4 years ago
- Python scripts for Malware Bazaar☆155Updated last year
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated 2 years ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 10 months ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆140Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆183Updated 4 years ago
- ☆128Updated 8 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 3 years ago
- ☆35Updated 3 years ago
- Collection of rules created using YARA-Signator over Malpedia☆137Updated 11 months ago
- Digital Forensics Artifacts Knowledge Base☆86Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆150Updated last month
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 8 months ago