A taxonomy and dictionary of malware behaviors.
☆43Aug 20, 2019Updated 6 years ago
Alternatives and similar repositories for malware-behaviors
Users that are interested in malware-behaviors are comparing it to the libraries listed below
Sorting:
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆33Jun 20, 2024Updated last year
- ☆13Nov 10, 2020Updated 5 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Tools for macOS Forensic Bootable media☆16May 20, 2020Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- Signature engine for all your logs☆172Nov 13, 2023Updated 2 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆84Feb 11, 2026Updated last month
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- C++ wrapper for YARA.☆45Jan 27, 2020Updated 6 years ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆26Nov 23, 2017Updated 8 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 5 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Jun 25, 2018Updated 7 years ago
- Registry Miner☆14Apr 10, 2018Updated 7 years ago
- ARG: Automatic ROP chains Generation☆21Jul 18, 2019Updated 6 years ago
- Commandline utility to interact with the Malpedia service☆22Dec 5, 2025Updated 3 months ago
- Awesome VirusTotal Intelligence Search Queries☆333May 16, 2023Updated 2 years ago
- ☆27Jun 29, 2023Updated 2 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Oct 25, 2019Updated 6 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- C Header Only Library for Virii☆11Nov 17, 2020Updated 5 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- pyGoRE - Python library for analyzing Go binaries☆66Feb 12, 2022Updated 4 years ago
- VM setup for Malware RE labs☆28Apr 26, 2019Updated 6 years ago
- ☆12May 8, 2020Updated 5 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆76Jan 6, 2026Updated 2 months ago
- This repository contains tools used by 401trg.☆20Apr 14, 2021Updated 4 years ago
- ☆16Sep 12, 2021Updated 4 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago