albertzsigovits / malware-tools
A curated list of malware repositories, trackers and malware analysis tools
☆84Updated 2 years ago
Alternatives and similar repositories for malware-tools:
Users that are interested in malware-tools are comparing it to the libraries listed below
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Automagically extract forensic timeline from volatile memory dump☆126Updated 9 months ago
- Various scripts for different malware families☆104Updated 3 years ago
- Random hunting ordiented yara rules☆95Updated last year
- Collection of YARA signatures from individual research☆42Updated last year
- Hunt malware with Volatility☆47Updated 9 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆13Updated 6 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 10 months ago
- Valhalla API Client☆67Updated 2 years ago
- Notes and IoCs of fresh malware☆57Updated 7 months ago
- Some YARA rules i will add from time to time☆64Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Various capabilities for static malware analysis.☆77Updated 5 months ago
- Personal research and publication on malware families☆137Updated last month
- Collection of various files from infected hosts☆71Updated 2 years ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- The Windows Malware Analysis Reversing Core Tools☆91Updated 4 years ago
- Python based CLI for MalwareBazaar☆36Updated 3 months ago
- Standardized Malware Analysis Tool☆52Updated 3 years ago
- Userland API monitor for threat hunting☆57Updated 4 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated last year
- ☆44Updated last year
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆85Updated 7 months ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆17Updated 2 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆38Updated 2 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated last year
- isodump - ISO dump utility☆40Updated 5 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago