bartblaze / MaTiReLinks
Malware Analysis, Threat Intelligence and Reverse Engineering: LABS
☆82Updated 4 years ago
Alternatives and similar repositories for MaTiRe
Users that are interested in MaTiRe are comparing it to the libraries listed below
Sorting:
- Lazy Office Analyzer☆122Updated 8 years ago
- Process HTTP Pcaps With YARA☆108Updated 12 years ago
- A Yara rule generator for finding related samples and hunting☆160Updated 3 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆48Updated 3 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Updated 6 years ago
- A collection of infosec related scripts and information.☆53Updated last year
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆83Updated last year
- Repository of yara rules☆60Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 4 months ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- general purpose and malware specific analysis tools☆101Updated 10 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- A warehouse for your malware☆135Updated 2 weeks ago
- YARA rules for use with ProcFilter☆88Updated 8 years ago
- A taxonomy and dictionary of malware behaviors.☆43Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- Various scripts for different malware families☆106Updated 4 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Updated 4 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆144Updated 5 years ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- Various config files obtained during malware analysis☆67Updated 7 years ago
- ☆136Updated 6 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆80Updated 2 months ago
- Python IOC Editor☆64Updated 10 years ago
- ☆37Updated 8 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago