albertzsigovits / malware-tools
A curated list of malware repositories, trackers and malware analysis tools
☆84Updated 2 years ago
Alternatives and similar repositories for malware-tools:
Users that are interested in malware-tools are comparing it to the libraries listed below
- Valhalla API Client☆68Updated 2 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Some YARA rules i will add from time to time☆64Updated 2 years ago
- Notes and IoCs of fresh malware☆57Updated 8 months ago
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- Various scripts for different malware families☆105Updated 3 years ago
- Random hunting ordiented yara rules☆95Updated last year
- Python based CLI for MalwareBazaar☆36Updated 4 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- The Windows Malware Analysis Reversing Core Tools☆92Updated 4 years ago
- Collection of various files from infected hosts☆73Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 11 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Malware Sandboxes & Malware Source☆90Updated 7 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Collection of YARA signatures from individual research☆44Updated last year
- Personal research and publication on malware families☆137Updated 2 months ago
- IcedID Decryption Tool☆28Updated 3 years ago
- Hunt malware with Volatility☆47Updated 10 months ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- Hatching Triage public command-line utility and API library.☆66Updated last year
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆127Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆17Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆113Updated last year
- TA505 unpacker Python 2.7☆47Updated 4 years ago