MalwareAnalysis
☆12Dec 19, 2020Updated 5 years ago
Alternatives and similar repositories for MalwareAnalysis
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below
Sorting:
- Library of threat hunts to get any user started!☆49Sep 4, 2020Updated 5 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- ☆14Aug 21, 2022Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- This repo contains samples which provide end to end integration between Azure AD and partner solutions.☆18Nov 11, 2024Updated last year
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- Mass Triage Tools☆20Dec 16, 2025Updated 2 months ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- ☆17Oct 13, 2025Updated 4 months ago
- A plugin for ILSpy that loads references that have been embedded as resources with Costura.☆23Aug 8, 2021Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Documentation used for Shuffle☆21Feb 19, 2026Updated last week
- Open source tool for static analysis of malwares.☆29Jul 10, 2020Updated 5 years ago
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- QuasarRAT analysis tools and research report☆29Dec 22, 2023Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Feb 13, 2022Updated 4 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Feb 20, 2024Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- ☆28May 25, 2021Updated 4 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Forensic tool for acquisition, triage and analysis of remote block devices via iSCSI protocol.☆44Oct 25, 2024Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- Run Velociraptor on Security Onion☆40Jul 27, 2022Updated 3 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- My favorite resources and tools for malware analysis.☆43Aug 18, 2020Updated 5 years ago
- All slides from my meetup talks☆37Jun 11, 2025Updated 8 months ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Oct 20, 2020Updated 5 years ago
- pySigma Splunk backend☆41Feb 19, 2026Updated last week
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago