alexandreborges / malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.
☆3,184Updated 3 months ago
Alternatives and similar repositories for malwoverview:
Users that are interested in malwoverview are comparing it to the libraries listed below
- A curated list of awesome YARA rules, tools, and people.☆3,788Updated last month
- Interesting APT Report Collection And Some Special IOC☆2,549Updated this week
- A toolset to make a system look as if it was the victim of an APT attack☆2,588Updated last year
- Red Teaming Tactics and Techniques☆4,244Updated 8 months ago
- YARA signature and IOC database for my scanners and tools☆2,608Updated this week
- Malware samples, analysis exercises and other interesting resources.☆1,550Updated last year
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,150Updated 9 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,128Updated last week
- Wiki to collect Red Team infrastructure hardening resources☆4,257Updated last year
- APT & CyberCriminal Campaign Collection☆3,877Updated 9 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,200Updated last year
- Digging Deeper....☆3,235Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,884Updated 10 months ago
- A collaborative, multi-platform, red teaming framework☆3,619Updated 3 weeks ago
- ☆2,270Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated 9 months ago
- Loki - Simple IOC and YARA Scanner☆3,524Updated 5 months ago
- Windows Events Attack Samples☆2,352Updated 2 years ago
- Automated Adversary Emulation Platform☆6,100Updated 2 weeks ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,885Updated last year
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,743Updated 10 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,485Updated 5 months ago
- yarGen is a generator for YARA rules☆1,637Updated last month
- A list of cyber-chef recipes and curated links☆2,075Updated 10 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,511Updated last week
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,588Updated 6 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,559Updated 2 weeks ago
- Repository of yara rules☆4,382Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,384Updated 9 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,263Updated last year