albertzsigovits / malware-notes
Notes and IoCs of fresh malware
☆58Updated 2 months ago
Related projects: ⓘ
- IOC Collection 2022☆55Updated last year
- Hive v5 file decryption algorithm☆34Updated last year
- ☆63Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆45Updated 5 months ago
- Quick analysis focusing on most important of a Malware or a Threat☆39Updated last year
- ☆34Updated 9 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Yara Rules for Modern Malware☆68Updated 6 months ago
- Lazarus analysis tools and research report☆54Updated 8 months ago
- ☆75Updated 3 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 3 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆76Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated 10 months ago
- Modular malware analysis artifact collection and correlation framework☆49Updated 4 months ago
- Just my findings of malwares☆39Updated 2 years ago
- The Windows Malware Analysis Reversing Core Tools☆88Updated 3 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆48Updated 5 months ago
- ☆62Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- C2 Active Scanner☆45Updated 3 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆107Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆144Updated last year
- Python based CLI for MalwareBazaar☆36Updated 9 months ago
- ☆95Updated 6 months ago
- My Malware Analysis Reports☆18Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆75Updated last week
- ☆17Updated this week
- ☆59Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆162Updated last year