MinervaLabsResearch / MystiqueView external linksLinks
Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malicious sample and automatically generates a list of mutexes that could be used to as “vaccines” against the sample.
☆82Sep 26, 2017Updated 8 years ago
Alternatives and similar repositories for Mystique
Users that are interested in Mystique are comparing it to the libraries listed below
Sorting:
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Container for assorted volatility plugins.☆23Oct 22, 2013Updated 12 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 6 years ago
- Honeybadger Red Edition☆13Sep 13, 2017Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Integrate Zeek with Alienvault OTX☆25Sep 11, 2020Updated 5 years ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54May 3, 2024Updated last year
- Use Markov Chains to obfuscate data as other data☆54Aug 3, 2016Updated 9 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Mar 4, 2024Updated last year
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 7 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Jul 6, 2023Updated 2 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- ☆174Jul 7, 2021Updated 4 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Feb 7, 2019Updated 7 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- Repository of yara rules☆60Nov 29, 2022Updated 3 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆164Apr 10, 2023Updated 2 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 8 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Aug 23, 2021Updated 4 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago