ashubits / Malware-AnalysisLinks
☆11Updated 9 months ago
Alternatives and similar repositories for Malware-Analysis
Users that are interested in Malware-Analysis are comparing it to the libraries listed below
Sorting:
- ☆12Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆28Updated 6 years ago
- ☆22Updated 4 years ago
- ☆35Updated 4 years ago
- Work in Progress repo☆15Updated 6 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Backdoor detection for VMware view☆13Updated 3 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 5 years ago
- ☆20Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆19Updated 5 years ago
- OSSEM Modular☆27Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- ☆15Updated 4 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 5 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆34Updated last year
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Updated 4 years ago
- A dataset of phishing kits in the wild☆15Updated last year
- Powershell / C# based cross platform forensic framework based for live incident response☆23Updated 5 years ago
- Learning volatility plugins.☆19Updated 4 years ago