alexandreborges / malwoverviewLinks
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.
☆3,472Updated last month
Alternatives and similar repositories for malwoverview
Users that are interested in malwoverview are comparing it to the libraries listed below
Sorting:
- A curated list of awesome YARA rules, tools, and people.☆4,094Updated 8 months ago
- Interesting APT Report Collection And Some Special IOCs☆2,769Updated last week
- YARA signature and IOC database for my scanners and tools☆2,816Updated last week
- A list of cyber-chef recipes and curated links☆2,150Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,592Updated last year
- Malware Configuration And Payload Extraction☆2,851Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,399Updated 2 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,690Updated 2 months ago
- Digging Deeper....☆3,621Updated this week
- Loki - Simple IOC and YARA Scanner☆3,694Updated last month
- Indicators of Compromises (IOC) of our various investigations☆1,895Updated last week
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,299Updated 2 years ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,038Updated 6 months ago
- yarGen is a generator for YARA rules☆1,751Updated 2 months ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,441Updated last year
- ☆2,362Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,401Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,025Updated last month
- Windows Events Attack Samples☆2,467Updated 2 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,874Updated last year
- Please no pull requests for this repository. Thanks!☆2,370Updated 3 weeks ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,603Updated last week
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,431Updated last year
- Red Teaming Tactics and Techniques☆4,446Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,240Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated last year
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,954Updated last week
- Repository of yara rules☆4,614Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,273Updated 2 weeks ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,687Updated last week