ZAYOTEM / malware-analysis-feed
[MAF - Malware Analysis Feed] This repository aim to collect useful scripts and rules for the detection of malware families analyzed by ZAYOTEM.
☆22Updated 11 months ago
Alternatives and similar repositories for malware-analysis-feed:
Users that are interested in malware-analysis-feed are comparing it to the libraries listed below
- This repository contains indicators of compromise (IOCs) of our various investigations.☆216Updated this week
- Evasion by machine code de-optimization.☆363Updated 6 months ago
- Repository of Yara Rules☆100Updated this week
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆105Updated 2 weeks ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆369Updated 3 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆134Updated 7 months ago
- Tools for analyzing EDR agents☆220Updated 8 months ago
- ☆232Updated 9 months ago
- IoC Feed for security analysts etc.☆13Updated 2 years ago
- ⚠️ Malware Development training ⚠️☆30Updated 2 months ago
- Statically unpacking common android banker malware.☆137Updated this week
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆154Updated last month
- ☆111Updated this week
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 3 years ago
- Vulnerable driver research tool, result and exploit PoCs☆184Updated last year
- stmctf22☆35Updated 2 years ago
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆17Updated last year
- Research notes☆118Updated 2 months ago
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆332Updated 3 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 5 months ago
- ☆327Updated this week
- FLARE Team's Binary Navigator☆222Updated last month
- A curated list of awesome Windows Exploitation resources, and shiny things.☆73Updated 7 years ago
- Rules shared by the community from 100 Days of YARA 2024☆83Updated last month
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆269Updated last year
- Code snips and notes☆134Updated 2 years ago
- AV/EDR Lab environment setup references to help in Malware development☆364Updated this week
- Cybersecurity research results. Simple C/C++ and Python implementations☆204Updated 2 weeks ago
- ☆129Updated last year