Reads and prints information from the website MalAPI.io
☆39Jan 18, 2022Updated 4 years ago
Alternatives and similar repositories for MalAPIReader
Users that are interested in MalAPIReader are comparing it to the libraries listed below
Sorting:
- Reads and prints information from the website MalAPI.io☆19Jul 14, 2022Updated 3 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Leetcode solutions☆15Dec 24, 2025Updated 2 months ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 2 years ago
- A lockout aware password sprayer☆15Jan 6, 2022Updated 4 years ago
- RemotePSpy provides live monitoring of remote PowerShell sessions, which is particularly useful for older (pre-5.0) versions of PowerShel…☆19Mar 12, 2020Updated 5 years ago
- This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges☆18Nov 5, 2023Updated 2 years ago
- Official Malice Plugins☆21Nov 26, 2018Updated 7 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆54Sep 16, 2025Updated 5 months ago
- A OSINT project that explores how to dump data from React☆80Sep 16, 2025Updated 5 months ago
- ☆22Mar 14, 2024Updated last year
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- Tools for inspecting YARA bytecode☆21Jul 1, 2020Updated 5 years ago
- Immediate Virus Infection Counter Measures☆63Apr 13, 2021Updated 4 years ago
- A set of tools for collecting forensic information☆27Apr 4, 2020Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- CAPE Auto-Hardened Installer☆26Jan 28, 2026Updated last month
- ☆24Mar 8, 2017Updated 8 years ago
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago
- Volatility Dockerfile☆32Oct 3, 2022Updated 3 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆785Feb 22, 2026Updated last week
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Nov 25, 2023Updated 2 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- ☆39Mar 25, 2021Updated 4 years ago
- thethe☆115Oct 21, 2020Updated 5 years ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆306May 7, 2025Updated 9 months ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- Artifact collection tool for *nix systems☆212Mar 20, 2024Updated last year
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago