MAECProject / schemas
MAEC Schemas and Schema Development
☆83Updated 4 years ago
Related projects: ⓘ
- Various capabilities for static malware analysis.☆75Updated 2 weeks ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆93Updated 2 weeks ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆59Updated 9 months ago
- This repository contains files from AppGate / Immunity Malware Analysis Team.☆21Updated 2 years ago
- mod to myaut2exe decompiler☆13Updated 7 years ago
- c2 traffic☆187Updated last year
- MWDB exercises☆19Updated 3 months ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆78Updated 3 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆128Updated last year
- Random hunting ordiented yara rules☆95Updated last year
- ☆75Updated 3 weeks ago
- Malware Sandboxes & Malware Source☆78Updated 7 years ago
- Powershell sandboxing utility☆17Updated this week
- YARA rule analyzer to improve rule quality and performance☆93Updated 9 months ago
- JPCERT/CC public YARA rules repository☆98Updated 2 months ago
- Simple yara rule manager☆64Updated last year
- Volatility plugins created by the author☆44Updated 8 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆57Updated last year
- A repo to document API functions mapped to security events across diverse platforms☆74Updated 4 years ago
- Research indicators and detection rules☆67Updated 11 months ago
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- Community modules for CAPE Sandbox☆84Updated last week
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆48Updated 5 months ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆19Updated 2 years ago
- Automatic YARA rule generation for Malpedia☆152Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- I wanted to call this repo "Nuclear Football Codes". I was outvoted..☆68Updated 2 years ago
- Automatically exported from code.google.com/p/malwarecookbook☆40Updated 9 years ago
- A mapping of used malware names to commonly known family names☆61Updated last year
- Collection of useful, up to date, Carbon Black Response Queries☆82Updated 3 years ago