alexandreborges / malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.
β3,142Updated 2 months ago
Alternatives and similar repositories for malwoverview:
Users that are interested in malwoverview are comparing it to the libraries listed below
- A curated list of awesome YARA rules, tools, and people.β3,739Updated last week
- β¨ A curated list of awesome threat detection and hunting resources π΅οΈββοΈβ4,102Updated 8 months ago
- Red Teaming Tactics and Techniquesβ4,208Updated 7 months ago
- Interesting APT Report Collection And Some Special IOCβ2,525Updated last week
- Wiki to collect Red Team infrastructure hardening resourcesβ4,238Updated 11 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term oβ¦β2,437Updated 2 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,426Updated last month
- Rapidly Search and Hunt through Windows Forensic Artefactsβ3,084Updated last week
- YARA signature and IOC database for my scanners and toolsβ2,582Updated this week
- Attack and defend active directory using modern post exploitation adversary tradecraft activityβ4,557Updated 4 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practicesβ4,716Updated 8 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β2,510Updated 8 months ago
- Malware samples, analysis exercises and other interesting resources.β1,536Updated last year
- A toolset to make a system look as if it was the victim of an APT attackβ2,558Updated last year
- Loki - Simple IOC and YARA Scannerβ3,502Updated 4 months ago
- A list of cyber-chef recipes and curated linksβ2,068Updated 9 months ago
- Digging Deeper....β3,171Updated last week
- β2,257Updated last year
- A collaborative, multi-platform, red teaming frameworkβ3,523Updated this week
- Volatility 3.0 developmentβ2,985Updated this week
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.β5,229Updated 5 months ago
- Automation for internal Windows Penetrationtest / AD-Securityβ3,452Updated 4 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysiβ¦β1,257Updated last year
- yarGen is a generator for YARA rulesβ1,621Updated 9 months ago
- Malware Configuration And Payload Extractionβ2,279Updated last week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more eβ¦β4,158Updated last year
- Windows Exploit Suggester - Next Generationβ4,365Updated last week
- A swiss army knife for pentesting networksβ8,654Updated last year
- The FLARE team's open-source tool to identify capabilities in executable files.β5,237Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering envβ¦β7,091Updated this week