alexandreborges / malwoverviewLinks
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.
☆3,338Updated 3 weeks ago
Alternatives and similar repositories for malwoverview
Users that are interested in malwoverview are comparing it to the libraries listed below
Sorting:
- A list of cyber-chef recipes and curated links☆2,129Updated last year
- A curated list of awesome YARA rules, tools, and people.☆3,937Updated 4 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,244Updated last month
- Malware samples, analysis exercises and other interesting resources.☆1,575Updated last year
- YARA signature and IOC database for my scanners and tools☆2,721Updated this week
- Loki - Simple IOC and YARA Scanner☆3,625Updated last week
- Malware Configuration And Payload Extraction☆2,619Updated this week
- A toolset to make a system look as if it was the victim of an APT attack☆2,636Updated 2 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,667Updated last week
- yarGen is a generator for YARA rules☆1,689Updated 4 months ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,417Updated 11 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,477Updated this week
- Windows Events Attack Samples☆2,412Updated 2 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,819Updated last year
- Digging Deeper....☆3,398Updated this week
- Please no pull requests for this repository. Thanks!☆2,286Updated 2 months ago
- Red Teaming Tactics and Techniques☆4,349Updated last year
- ☆2,319Updated last year
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,961Updated 2 months ago
- Automated Adversary Emulation Platform☆6,354Updated last week
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,277Updated 2 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,969Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,330Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,540Updated 2 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,684Updated 2 weeks ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,295Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,809Updated 2 weeks ago
- APT & CyberCriminal Campaign Collection☆3,956Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,696Updated 3 weeks ago
- Detect Tactics, Techniques & Combat Threats☆2,194Updated last month