StupidBird-Code / Malware_Analysize-ToolsLinks
Here are some tools I developed to help analyze malware
☆12Updated 2 years ago
Alternatives and similar repositories for Malware_Analysize-Tools
Users that are interested in Malware_Analysize-Tools are comparing it to the libraries listed below
Sorting:
- ☆36Updated 3 years ago
- ☆23Updated 2 years ago
- ☆11Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Yara Rules for Modern Malware☆78Updated last year
- Hundred Days of Yara Challenge☆12Updated 3 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Updated 3 years ago
- ☆27Updated 3 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Updated 3 years ago
- ☆24Updated 10 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- ☆66Updated 3 years ago
- ☆18Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- Lazarus analysis tools and research report☆57Updated 2 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆64Updated last year
- Thor Artifacts for Velociraptor☆19Updated 2 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24Updated 2 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆76Updated last month
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25Updated 2 years ago
- A small util to brute-force prefetch hashes☆77Updated 3 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 3 years ago
- ☆33Updated 3 years ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Updated 3 years ago