RussianPanda95 / Configuration_extractors
Configuration Extractors for Malware
☆94Updated 2 months ago
Alternatives and similar repositories for Configuration_extractors:
Users that are interested in Configuration_extractors are comparing it to the libraries listed below
- Repository of Yara Rules☆103Updated last month
- C2 Active Scanner☆55Updated 9 months ago
- ☆37Updated last year
- Yara Rules for Modern Malware☆75Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- A C# based tool for analysing malicious OneNote documents☆111Updated last year
- ☆65Updated 2 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 7 months ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 3 months ago
- IDA Python scripts☆34Updated this week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- A ProcessMonitor visualization application written in rust.☆177Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated 3 weeks ago
- ☆32Updated this week
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆49Updated 3 weeks ago
- Powershell Linter☆50Updated this week
- ☆22Updated last month
- ☆66Updated 2 years ago
- ☆80Updated 4 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated last year
- A specification and style guide for YARA rules☆47Updated last year
- ☆25Updated 2 years ago
- ☆31Updated this week
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆28Updated 4 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆121Updated 2 months ago
- ☆20Updated last year
- Some of my Malware Analysis writeups.☆44Updated last year
- IOCs collected during day-to-day activities☆42Updated this week
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago