alexandreborges / malwoverviewLinks
Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, and IPInfo, as well as to check for vulnerabilities in Android devices. Now, it also retrieves vulnerability logs from NIST.
☆3,531Updated 3 weeks ago
Alternatives and similar repositories for malwoverview
Users that are interested in malwoverview are comparing it to the libraries listed below
Sorting:
- A curated list of awesome YARA rules, tools, and people.☆4,136Updated 10 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,438Updated 3 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,607Updated 2 years ago
- Loki - Simple IOC and YARA Scanner☆3,715Updated 3 weeks ago
- YARA signature and IOC database for my scanners and tools☆2,864Updated this week
- Interesting APT Report Collection And Some Special IOCs☆2,887Updated last week
- A list of cyber-chef recipes and curated links☆2,183Updated last year
- Malware Configuration And Payload Extraction☆2,991Updated this week
- A toolset to make a system look as if it was the victim of an APT attack☆2,707Updated 4 months ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,484Updated last month
- Digging Deeper....☆3,747Updated this week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,901Updated last year
- yarGen is a generator for YARA rules☆1,774Updated last month
- ☆2,382Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,468Updated 3 weeks ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,455Updated last year
- Red Teaming Tactics and Techniques☆4,487Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,049Updated 3 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,813Updated this week
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,301Updated 2 years ago
- Windows Events Attack Samples☆2,502Updated 3 years ago
- Repository of yara rules☆4,697Updated last year
- Automated Adversary Emulation Platform☆6,733Updated this week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,311Updated last week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,071Updated 2 months ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,068Updated 8 months ago
- Indicators of Compromises (IOC) of our various investigations☆1,915Updated last week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,899Updated 3 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,617Updated last month
- Network Analysis Tool☆3,323Updated 2 years ago