alexandreborges / malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
☆2,969Updated last week
Related projects ⓘ
Alternatives and complementary repositories for malwoverview
- A curated list of awesome YARA rules, tools, and people.☆3,565Updated this week
- Loki - Simple IOC and YARA Scanner☆3,402Updated 3 weeks ago
- YARA signature and IOC database for my scanners and tools☆2,486Updated this week
- Interesting APT Report Collection And Some Special IOC☆2,439Updated this week
- Red Teaming Tactics and Techniques☆4,065Updated 2 months ago
- Automated Adversary Emulation Platform☆5,660Updated this week
- Digging Deeper....☆2,984Updated this week
- Wiki to collect Red Team infrastructure hardening resources☆4,152Updated 7 months ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆3,847Updated 4 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,470Updated last year
- A collaborative, multi-platform, red teaming framework☆3,264Updated this week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,648Updated 4 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,237Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,105Updated last week
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,384Updated 2 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆9,791Updated this week
- APT & CyberCriminal Campaign Collection☆3,724Updated 3 months ago
- Malware Configuration And Payload Extraction☆2,011Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,738Updated 5 months ago
- yarGen is a generator for YARA rules☆1,557Updated 5 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,025Updated 9 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,478Updated 10 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,044Updated 3 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,877Updated last week
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,422Updated 2 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,508Updated 4 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,261Updated last week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,739Updated 5 months ago
- Detect Tactics, Techniques & Combat Threats☆2,067Updated 2 weeks ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,337Updated 9 months ago