Malware Analysis, Threat Intelligence and Reverse Engineering: LABS
☆82Dec 24, 2020Updated 5 years ago
Alternatives and similar repositories for MaTiRe
Users that are interested in MaTiRe are comparing it to the libraries listed below
Sorting:
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368May 21, 2024Updated last year
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- ☆12May 6, 2020Updated 5 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆93Oct 15, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- A sample IoT bot origin from Mirai☆20Mar 29, 2017Updated 8 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Extract and aggregate threat intelligence.☆908Jan 31, 2024Updated 2 years ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- The Multiplatform Linux Sandbox☆266Jan 3, 2022Updated 4 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- ☆35Nov 2, 2022Updated 3 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- Yet Another YARA rule Generator☆65Oct 9, 2018Updated 7 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- static malware analysis and report tool open source version for linux☆17Jun 17, 2017Updated 8 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- ☆11Oct 28, 2016Updated 9 years ago