boozallen / MOTIFLinks
☆160Updated 3 years ago
Alternatives and similar repositories for MOTIF
Users that are interested in MOTIF are comparing it to the libraries listed below
Sorting:
- Security ML models encoded as Yara rules☆215Updated 2 years ago
- Malware repository component for samples & static configuration with REST API interface.☆370Updated last week
- Malduck is your ducky companion in malware analysis journeys☆346Updated 5 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆449Updated last month
- Python scripts for Malware Bazaar☆157Updated last year
- MBC content in markdown☆499Updated 5 months ago
- A guide on how to write fast and memory friendly YARA rules☆157Updated 9 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 2 years ago
- Malware Sandboxes & Malware Source☆102Updated 8 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆113Updated 6 months ago
- YARA malware query accelerator (web frontend)☆434Updated 2 months ago
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆240Updated 2 years ago
- ☆37Updated 5 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆654Updated last week
- Automated Yara Rule generation using Biclustering☆75Updated last month
- YARA Rules I come across on the internet☆355Updated last year
- Collection of private Yara rules.☆374Updated last week
- Automatic YARA rule generation for Malpedia☆164Updated 3 years ago
- IOC from articles, tweets for archives☆319Updated last year
- ☆212Updated 6 months ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆339Updated 9 months ago
- ☆131Updated last year
- Collection of rules created using YARA-Signator over Malpedia☆141Updated last year
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Updated 2 years ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆35Updated 2 weeks ago
- Various capabilities for static malware analysis.☆79Updated last year
- Community modules for CAPE Sandbox☆107Updated last week
- c2 traffic☆192Updated 2 years ago
- AssemblyLine 4: File triage and malware analysis☆395Updated last week
- The Volatility Collaborative GUI☆263Updated this week