alexandreborges / malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.
☆3,174Updated 3 months ago
Alternatives and similar repositories for malwoverview:
Users that are interested in malwoverview are comparing it to the libraries listed below
- A curated list of awesome YARA rules, tools, and people.☆3,775Updated last month
- Wiki to collect Red Team infrastructure hardening resources☆4,253Updated last year
- Red Teaming Tactics and Techniques☆4,235Updated 8 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,737Updated 9 months ago
- Interesting APT Report Collection And Some Special IOC☆2,534Updated this week
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,449Updated 2 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,544Updated last year
- Digging Deeper....☆3,218Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,116Updated last month
- Automated Adversary Emulation Platform☆6,066Updated last week
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,120Updated 9 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10,460Updated this week
- A collaborative, multi-platform, red teaming framework☆3,582Updated last week
- Loki - Simple IOC and YARA Scanner☆3,520Updated 5 months ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,873Updated last year
- ☆2,268Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,877Updated 10 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,090Updated 3 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,186Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated 9 months ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,581Updated 5 months ago
- YARA signature and IOC database for my scanners and tools☆2,603Updated last week
- A toolset to make a system look as if it was the victim of an APT attack☆2,570Updated last year
- Automation for internal Windows Penetrationtest / AD-Security☆3,476Updated 5 months ago
- Windows Events Attack Samples☆2,345Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,528Updated 2 weeks ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,690Updated last year
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,262Updated last year
- Arsenal is just a quick inventory and launcher for hacking programs☆3,399Updated 4 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,002Updated last month