alexandreborges / malwoverviewLinks
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.
☆3,459Updated last week
Alternatives and similar repositories for malwoverview
Users that are interested in malwoverview are comparing it to the libraries listed below
Sorting:
- A curated list of awesome YARA rules, tools, and people.☆4,070Updated 7 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,364Updated last month
- A list of cyber-chef recipes and curated links☆2,147Updated last year
- Loki - Simple IOC and YARA Scanner☆3,675Updated 3 weeks ago
- Malware samples, analysis exercises and other interesting resources.☆1,589Updated last year
- YARA signature and IOC database for my scanners and tools☆2,787Updated last week
- Digging Deeper....☆3,564Updated this week
- Interesting APT Report Collection And Some Special IOCs☆2,714Updated this week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,031Updated 5 months ago
- Malware Configuration And Payload Extraction☆2,789Updated last week
- A toolset to make a system look as if it was the victim of an APT attack☆2,678Updated last month
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,642Updated last week
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,442Updated last year
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,291Updated 2 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,874Updated 3 weeks ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,009Updated 3 weeks ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,858Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated last year
- yarGen is a generator for YARA rules☆1,738Updated last month
- Windows Events Attack Samples☆2,441Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,412Updated last year
- ☆2,353Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,393Updated last year
- Please no pull requests for this repository. Thanks!☆2,347Updated last week
- APT & CyberCriminal Campaign Collection☆4,003Updated last year
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,780Updated this week
- Materials for Windows Malware Analysis training (volume 1)☆2,012Updated last year
- Automated Adversary Emulation Platform☆6,538Updated this week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,027Updated last week
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,583Updated 2 weeks ago