VirusTotal / vt-use-cases
vt-use-cases
☆18Updated last year
Alternatives and similar repositories for vt-use-cases:
Users that are interested in vt-use-cases are comparing it to the libraries listed below
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated 10 months ago
- Share your Yara rules with VirusTotal☆25Updated 8 months ago
- A curated list of awesome malware analysis tools and resources☆14Updated 7 years ago
- Scans the filesystem for directories that are user-writeable☆11Updated 3 years ago
- Automate Sysmon Deployment and Configuration☆18Updated 9 months ago
- Extension blocks as found in ShellBags and other places in the Registry☆24Updated 3 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 6 months ago
- A command line utility to interact and query the Centrifuge API.☆16Updated last year
- Windows Registry Analysis Tool☆12Updated last year
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- Mount VSCs with ease!☆16Updated 3 months ago
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆14Updated 6 years ago
- Collection of YARA rules designed for usage through VirusTotal.com.☆68Updated last year
- THOR APT Scanner User Manual☆18Updated this week
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆32Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Android Usagestats XML + Protobuf Parser☆23Updated 4 years ago
- This is a repository for reporting any issues in any of my software☆13Updated 6 years ago
- Harden Windows with Windows Defender Application Control (WDAC)☆40Updated 9 months ago
- An efficient tool for search files, directories, and alternate data streams directly from NTFS image files.☆26Updated last year
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- ☆18Updated 3 months ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 3 months ago
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆34Updated 3 years ago
- Powerful Python tool to analyze PDF documents☆25Updated 2 years ago
- ☆66Updated 2 months ago
- Get USB Devices from Registry hives☆21Updated 3 years ago
- Library to process OLE compound file format. This is a work in progress and was initially written for jumplist parsing (for which it does…☆18Updated 3 months ago
- Dump Windows registry hives as text.☆16Updated 6 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 7 months ago