Malware Analysis, Threat Intelligence and Reverse Engineering: LABS
☆82Dec 24, 2020Updated 5 years ago
Alternatives and similar repositories for MaTiRe
Users that are interested in MaTiRe are comparing it to the libraries listed below
Sorting:
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368May 21, 2024Updated last year
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 5 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- A sample IoT bot origin from Mirai☆20Mar 29, 2017Updated 8 years ago
- The Multiplatform Linux Sandbox☆266Jan 3, 2022Updated 4 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Yet Another YARA rule Generator☆65Oct 9, 2018Updated 7 years ago
- static malware analysis and report tool open source version for linux☆17Jun 17, 2017Updated 8 years ago
- Extract and aggregate threat intelligence.☆906Jan 31, 2024Updated 2 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- ☆22Oct 13, 2017Updated 8 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago
- ☆35Nov 2, 2022Updated 3 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373May 8, 2019Updated 6 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Azure-Sentinel-BYOML☆12Nov 8, 2019Updated 6 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆93Oct 15, 2017Updated 8 years ago
- FAME Automates Malware Evaluation☆928Dec 16, 2025Updated 2 months ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- Java ClassLoader for Nashorn with Maven support. Allows to define any Java dependencies directly in scripts.☆13Oct 22, 2019Updated 6 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ☆10Jan 2, 2016Updated 10 years ago