NavyTitanium / Misc-MalwaresLinks
Collection of various files from infected hosts
☆75Updated 3 years ago
Alternatives and similar repositories for Misc-Malwares
Users that are interested in Misc-Malwares are comparing it to the libraries listed below
Sorting:
- Various scripts for different malware families☆106Updated 4 years ago
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 11 months ago
- Personal research and publication on malware families☆140Updated 7 months ago
- A curated list of malware repositories, trackers and malware analysis tools☆86Updated 2 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- Miscellaneous Malware RE☆196Updated 3 years ago
- ☆134Updated 6 years ago
- ☆84Updated 5 years ago
- CLI tool to analyze PE files☆87Updated 10 months ago
- Collection of YARA signatures from individual research☆44Updated last year
- YARA rules for use with ProcFilter☆87Updated 8 years ago
- VSCode extension for the YARA pattern matching language☆64Updated last year
- ☆128Updated 6 months ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆116Updated 2 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- Balbuzard is a package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain na…☆138Updated 5 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆75Updated last month
- Lazy Office Analyzer☆122Updated 8 years ago
- Some YARA rules i will add from time to time☆64Updated 2 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆139Updated 2 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- c2 traffic☆189Updated 2 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Various capabilities for static malware analysis.☆78Updated 11 months ago
- Malquarium - Modern Malware Repository☆47Updated this week