boozallen / MOTIF
☆148Updated 2 years ago
Alternatives and similar repositories for MOTIF:
Users that are interested in MOTIF are comparing it to the libraries listed below
- Security ML models encoded as Yara rules☆214Updated last year
- Malduck is your ducky companion in malware analysis journeys☆330Updated this week
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated last month
- MBC content in markdown☆440Updated last month
- ☆30Updated last month
- IOC from articles, tweets for archives☆313Updated last year
- Python scripts for Malware Bazaar☆153Updated 11 months ago
- Automatic YARA rule generation for Malpedia☆160Updated 2 years ago
- A guide on how to write fast and memory friendly YARA rules☆142Updated 2 months ago
- Malware repository component for samples & static configuration with REST API interface.☆351Updated 2 weeks ago
- Distributed malware processing framework based on Python, Redis and S3.☆419Updated last month
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆247Updated 2 years ago
- ☆130Updated last year
- c2 traffic☆188Updated 2 years ago
- Collection of rules created using YARA-Signator over Malpedia☆128Updated 5 months ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆375Updated 2 years ago
- Various capabilities for static malware analysis.☆78Updated 8 months ago
- Threat Hunting tool about Sysmon and graphs☆332Updated last year
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆316Updated 3 months ago
- YARA Rules I come across on the internet☆338Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- Collection of private Yara rules.☆354Updated 3 weeks ago
- Set of Yara rules for finding files using magics headers☆137Updated 4 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆236Updated 2 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆39Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated last year
- File analysis and management framework.☆82Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆116Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211Updated 2 years ago