MalGamy / YARA_Rules
☆64Updated last year
Related projects ⓘ
Alternatives and complementary repositories for YARA_Rules
- Hive v5 file decryption algorithm☆34Updated last year
- IOC Collection 2022☆55Updated last year
- ☆34Updated 11 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- Just my findings of malwares☆39Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆35Updated 10 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 5 months ago
- Configuration Extractors for Malware☆53Updated 3 weeks ago
- Detection rule validation☆41Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆26Updated 3 months ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆48Updated 7 months ago
- C2 Active Scanner☆47Updated 4 months ago
- Notes and IoCs of fresh malware☆58Updated 4 months ago
- Contains compiled binaries of Volatility☆29Updated 3 weeks ago
- A specification and style guide for YARA rules☆37Updated 8 months ago
- A C# based tool for analysing malicious OneNote documents☆107Updated last year
- Lazarus analysis tools and research report☆55Updated 10 months ago
- Linux Baseline and Forensic Triage Tool - BETA☆50Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆47Updated 7 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆56Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆80Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 4 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- ☆36Updated 7 months ago
- yara detection rules for hunting with the threathunting-keywords project☆83Updated this week
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated 10 months ago