alexandreborges / malwoverviewLinks
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.
☆3,308Updated this week
Alternatives and similar repositories for malwoverview
Users that are interested in malwoverview are comparing it to the libraries listed below
Sorting:
- A list of cyber-chef recipes and curated links☆2,120Updated last year
- A curated list of awesome YARA rules, tools, and people.☆3,888Updated 4 months ago
- Loki - Simple IOC and YARA Scanner☆3,595Updated 8 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,627Updated 2 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,604Updated last week
- YARA signature and IOC database for my scanners and tools☆2,697Updated last week
- Malware samples, analysis exercises and other interesting resources.☆1,568Updated last year
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,273Updated last year
- Digging Deeper....☆3,364Updated this week
- Windows Events Attack Samples☆2,395Updated 2 years ago
- yarGen is a generator for YARA rules☆1,676Updated 3 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,217Updated 3 weeks ago
- Malware Configuration And Payload Extraction☆2,562Updated this week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,304Updated last year
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,272Updated 2 years ago
- Please no pull requests for this repository. Thanks!☆2,272Updated last month
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,952Updated 2 months ago
- Automated Adversary Emulation Platform☆6,316Updated this week
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,417Updated 10 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,808Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,187Updated last week
- Red Teaming Tactics and Techniques☆4,329Updated 11 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,934Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,800Updated last week
- ☆2,305Updated last year
- APT & CyberCriminal Campaign Collection☆3,941Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Updated last year
- Your Everyday Threat Intelligence☆1,888Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,422Updated last week
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,323Updated last week