albertzsigovits / malware-tools
A curated list of malware repositories, trackers and malware analysis tools
☆84Updated 2 years ago
Alternatives and similar repositories for malware-tools
Users that are interested in malware-tools are comparing it to the libraries listed below
Sorting:
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Various scripts for different malware families☆106Updated 4 years ago
- Various capabilities for static malware analysis.☆78Updated 8 months ago
- Valhalla API Client☆68Updated 2 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Hunt malware with Volatility☆47Updated last year
- Random hunting ordiented yara rules☆96Updated 2 years ago
- Notes and IoCs of fresh malware☆58Updated 10 months ago
- Collection of YARA signatures from individual research☆44Updated last year
- Collection of various files from infected hosts☆76Updated 3 years ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- VirusTotal Intelligence Search☆37Updated 4 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Carbon Black Response IR tool☆53Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆49Updated 2 years ago
- isodump - ISO dump utility☆40Updated 5 years ago
- Malware Configuration Extraction Modules☆49Updated last year
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Updated 3 years ago
- Windows link file (shortcuts) examiner☆68Updated 11 months ago
- Manipulate timestamps on NTFS☆50Updated 10 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆128Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- Standardized Malware Analysis Tool☆52Updated 4 years ago
- Some YARA rules i will add from time to time☆64Updated 2 years ago
- Simulating Adversary Operations☆93Updated 7 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago