MalwareAnalysis
☆12Dec 19, 2020Updated 5 years ago
Alternatives and similar repositories for MalwareAnalysis
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below
Sorting:
- SUNBURST DGA decoder☆11Dec 23, 2020Updated 5 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- OC Admin (Formerly EZ-Cloud) - the Open Collector Admin and On-Boarder for Core SIEM☆12Jan 13, 2026Updated 2 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- Sharing my BITS☆13Feb 23, 2018Updated 8 years ago
- Documentation used for Shuffle☆21Mar 13, 2026Updated last week
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- Bash script for performing the logical acquisition of Apple Silicon Mac☆17Jun 21, 2024Updated last year
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 6 months ago
- Mass Triage Tools☆20Mar 10, 2026Updated last week
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Sysmon configuration file template with default high-quality event tracing☆20Jan 26, 2021Updated 5 years ago
- ☆15Sep 24, 2024Updated last year
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Feb 11, 2026Updated last month
- Radare2 Metadata Extraction to Elasticsearch☆23May 21, 2024Updated last year
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago
- Pattern matching DSL for R☆25Jan 31, 2020Updated 6 years ago
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- pySigma Splunk backend☆41Mar 15, 2026Updated last week
- ☆16Feb 16, 2026Updated last month
- Official Website Of The Sigma Project☆23Feb 16, 2026Updated last month
- LogRhythm PowerShell Toolkit☆53Jan 2, 2026Updated 2 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- ☆22Aug 31, 2016Updated 9 years ago