MalGamy / YARA_RulesLinks
☆67Updated 2 years ago
Alternatives and similar repositories for YARA_Rules
Users that are interested in YARA_Rules are comparing it to the libraries listed below
Sorting:
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- C2 Active Scanner☆60Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆40Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Yara Rules for Modern Malware☆78Updated last year
- IOC Collection 2022☆57Updated 2 years ago
- ☆31Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Lazarus analysis tools and research report☆57Updated last year
- Detection rule validation☆40Updated 2 years ago
- ☆96Updated 7 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- bad stuffs by bad guys☆49Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated last year
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated 2 years ago
- ☆26Updated 3 years ago
- Configuration Extractor for BlackCat Ransomware☆31Updated 3 years ago
- ☆44Updated 3 weeks ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- Open IOC sharing platform☆63Updated last year
- Reads and prints information from the website MalAPI.io☆19Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago