[MAF - Malware Analysis Feed] This repository aim to collect useful scripts and rules for the detection of malware families analyzed by ZAYOTEM.
☆23Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for malware-analysis-feed
Users that are interested in malware-analysis-feed are comparing it to the libraries listed below
Sorting:
- Malware Analysis (Zararlı Yazılım Analizi)☆32Aug 1, 2019Updated 6 years ago
- stmctf22☆35Nov 16, 2022Updated 3 years ago
- This is a collection of stealers for educational purposes☆21Aug 13, 2025Updated 6 months ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Gatsby theme scarlet is a personal portfolio which features 3 slides, several beautiful shades of purple, and our star Scarlet.☆12Feb 24, 2026Updated last week
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 weeks ago
- ☆10Mar 27, 2022Updated 3 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Configurations to implement Wazuh☆12Nov 28, 2022Updated 3 years ago
- SOLID principles using modern C++☆10Dec 11, 2021Updated 4 years ago
- ScanWP is an open-source scanning tool designed to identify potential security vulnerabilities in WordPress sites.☆12Nov 14, 2023Updated 2 years ago
- ☆12Apr 5, 2025Updated 11 months ago
- Examples of HA configurations of Hashicorp Vault across AWS, GCP, and Azure☆12May 2, 2023Updated 2 years ago
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- Opscode Cookbooks for Chef☆50Nov 29, 2010Updated 15 years ago
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Jul 7, 2021Updated 4 years ago
- Tool to collect and visualize memory usage of a process tree, mainly for Windows.☆19Dec 5, 2024Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 8 months ago
- ☆20Apr 10, 2025Updated 10 months ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- Hands-on workshop on the basics of hardware hacking.☆123Sep 5, 2023Updated 2 years ago
- Anti-Malware application for Windows - Archive☆11Jul 18, 2019Updated 6 years ago
- Command-line tool for Rackspace Cloud Load Balancers☆30Jun 6, 2014Updated 11 years ago
- 📖 Al-Quran mini web app. Built with Next.js & TailwindCSS☆13Sep 9, 2021Updated 4 years ago
- Generates network traffic summaries.☆23Dec 9, 2025Updated 3 months ago
- Linux ortamına ait Anti-Analiz teknikleri uygulaması.☆10Aug 6, 2017Updated 8 years ago
- Automatically mount EC2 EBS (Elastic Block Storage) devices☆31Oct 2, 2025Updated 5 months ago
- ☆11Nov 6, 2020Updated 5 years ago
- Siber Yıldız 2020 CTF Soruları ve Çözümleri☆15Dec 28, 2020Updated 5 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- Lazy realtime web.☆43Aug 23, 2012Updated 13 years ago
- Statically unpacking common android banker malware.☆160Apr 2, 2025Updated 11 months ago
- Open Source Python library for accessing Amazon SimpleDB API☆79Nov 20, 2021Updated 4 years ago
- Documenting my process of building *rides*☆15Nov 20, 2024Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- Small fuzzing library with an example script using it.☆21Feb 12, 2021Updated 5 years ago
- Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)☆17Apr 29, 2021Updated 4 years ago
- ☆23Aug 1, 2020Updated 5 years ago