Notes and IoCs of fresh malware
☆62Jul 5, 2024Updated last year
Alternatives and similar repositories for malware-notes
Users that are interested in malware-notes are comparing it to the libraries listed below
Sorting:
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- ☆23Aug 1, 2020Updated 5 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Dec 13, 2023Updated 2 years ago
- A guide on how to write fast and memory friendly YARA rules☆166Feb 11, 2025Updated last year
- ☆96May 5, 2025Updated 9 months ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆239Oct 14, 2024Updated last year
- Tracking APT IOCs☆25Nov 16, 2020Updated 5 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 10 months ago
- Slides and stuffs of the meetings during the 2018☆13Jan 18, 2022Updated 4 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 11 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- This tool will help you find a mutual friend☆81Updated this week
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆16Apr 8, 2022Updated 3 years ago
- ☆10Mar 29, 2022Updated 3 years ago
- Domaintools addon for Maltego☆15Sep 13, 2012Updated 13 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- ☆11Dec 26, 2022Updated 3 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆10Jun 10, 2023Updated 2 years ago
- BabelDeobfuscator is an open-source deobfuscator for BabelObfuscator☆11May 15, 2015Updated 10 years ago
- A simple and universal .NET proxy remover☆11Jun 14, 2020Updated 5 years ago