JPCERTCC / QuasarRAT-AnalysisLinks
QuasarRAT analysis tools and research report
☆27Updated last year
Alternatives and similar repositories for QuasarRAT-Analysis
Users that are interested in QuasarRAT-Analysis are comparing it to the libraries listed below
Sorting:
- ☆22Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- ProcDot Malware Sandbox☆24Updated 2 months ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- This is a repository that is meant to hold detections for various process injection techniques.☆34Updated 5 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- My Malware Analysis Reports☆23Updated 3 years ago
- ☆36Updated 2 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- volatility explorer☆92Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆62Updated 6 years ago
- ☆23Updated 5 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 3 years ago
- Lazarus analysis tools and research report☆56Updated last year
- AdHoc solutions☆48Updated 2 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆11Updated 4 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- This repository contains zip archives of pcaps for our Wireshark tutorial about examining Emotet infection traffic. The password for any …☆25Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆27Updated 4 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Updated 5 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Symantec EDR Internals☆28Updated 3 years ago
- ☆24Updated last year