GDATASoftwareAG / MSELinks
Malware sample exchange system and API intended for Anti-Virus companies and researchers.
☆16Updated 9 months ago
Alternatives and similar repositories for MSE
Users that are interested in MSE are comparing it to the libraries listed below
Sorting:
- The Multiplatform Linux Sandbox☆15Updated last year
- ☆23Updated 4 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆10Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- ☆22Updated last year
- ☆12Updated 3 years ago
- ProcDot Malware Sandbox☆24Updated 6 months ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Static configuration extractor for the Karton framework☆10Updated 4 months ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- ☆20Updated 4 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- ☆15Updated 3 years ago
- Simplified go-cat agent for caldera☆10Updated last year
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Updated 6 months ago
- C# User Simulation☆32Updated 2 years ago
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Qakbot Registry Key Configuration Decryptor☆14Updated 3 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 4 years ago