appgate / labsLinks
This repository contains files from AppGate / Immunity Malware Analysis Team.
☆21Updated 3 years ago
Alternatives and similar repositories for labs
Users that are interested in labs are comparing it to the libraries listed below
Sorting:
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Various capabilities for static malware analysis.☆78Updated 9 months ago
- Simple yara rule manager☆66Updated 2 years ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Python based CLI for MalwareBazaar☆37Updated 7 months ago
- Powershell sandboxing utility☆18Updated last month
- YARA rule analyzer to improve rule quality and performance☆102Updated 2 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- JPCERT/CC public YARA rules repository☆109Updated 6 months ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated last month
- VSCode extension for the YARA pattern matching language☆64Updated last year
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Automatic YARA rule generation for Malpedia☆161Updated 2 years ago
- Ursnif beacon decryptor☆27Updated 2 years ago
- Standardized Malware Analysis Tool☆53Updated 4 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated 4 months ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Malware Configuration Extraction Modules☆50Updated last year
- Valhalla API Client☆70Updated 2 years ago
- MWDB exercises☆20Updated 5 months ago
- c2 traffic☆189Updated 2 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- ☆16Updated last year
- Hunt malware with Volatility☆47Updated last year
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆64Updated 2 years ago
- Research indicators and detection rules☆66Updated last year