alexandreborges / malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.
☆3,070Updated last month
Alternatives and similar repositories for malwoverview:
Users that are interested in malwoverview are comparing it to the libraries listed below
- A curated list of awesome YARA rules, tools, and people.☆3,646Updated 2 months ago
- YARA signature and IOC database for my scanners and tools☆2,525Updated last month
- Interesting APT Report Collection And Some Special IOC☆2,480Updated this week
- Loki - Simple IOC and YARA Scanner☆3,444Updated last month
- Malware Configuration And Payload Extraction☆2,109Updated this week
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆3,961Updated 6 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,996Updated 2 weeks ago
- A collaborative, multi-platform, red teaming framework☆3,373Updated 2 weeks ago
- Malware samples, analysis exercises and other interesting resources.☆1,498Updated last year
- yarGen is a generator for YARA rules☆1,586Updated 7 months ago
- A list of cyber-chef recipes and curated links☆2,049Updated 7 months ago
- APT & CyberCriminal Campaign Collection☆3,787Updated 5 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,497Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,461Updated 2 months ago
- Repository of yara rules☆4,247Updated 9 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆6,779Updated this week
- Wiki to collect Red Team infrastructure hardening resources☆4,195Updated 9 months ago
- Automated Adversary Emulation Platform☆5,786Updated last week
- Red Teaming Tactics and Techniques☆4,116Updated 4 months ago
- Digging Deeper....☆3,058Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,000Updated this week
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,405Updated 4 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,800Updated 6 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,405Updated last month
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,680Updated 6 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,075Updated 11 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,834Updated last month
- ☆2,217Updated last year
- Please no pull requests for this repository. Thanks!☆2,089Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,507Updated 6 months ago