MalwareAnalysis
☆12Dec 19, 2020Updated 5 years ago
Alternatives and similar repositories for MalwareAnalysis
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆33Feb 26, 2022Updated 4 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆21Oct 2, 2020Updated 5 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- OC Admin (Formerly EZ-Cloud) - the Open Collector Admin and On-Boarder for Core SIEM☆12Jan 13, 2026Updated 2 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- Sharing my BITS☆13Feb 23, 2018Updated 8 years ago
- Documentation used for Shuffle☆21Apr 1, 2026Updated last week
- ☆17Oct 13, 2025Updated 5 months ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Bash script for performing the logical acquisition of Apple Silicon Mac☆17Jun 21, 2024Updated last year
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated 2 months ago
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 6 months ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Python 3.6+ SSH Client for network devices built on ssh2-python☆12Apr 11, 2020Updated 5 years ago
- Sysmon configuration file template with default high-quality event tracing☆20Jan 26, 2021Updated 5 years ago
- ☆15Sep 24, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A plugin for ILSpy that loads references that have been embedded as resources with Costura.☆23Aug 8, 2021Updated 4 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Feb 11, 2026Updated 2 months ago
- Radare2 Metadata Extraction to Elasticsearch☆23May 21, 2024Updated last year
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago
- Network discovery tool for cloud environments☆28May 23, 2022Updated 3 years ago
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- pySigma Splunk backend☆41Mar 22, 2026Updated 2 weeks ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆16Mar 27, 2026Updated 2 weeks ago
- Official Website Of The Sigma Project☆23Feb 16, 2026Updated last month
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆29Apr 22, 2023Updated 2 years ago
- Open source tool for static analysis of malwares.☆29Jul 10, 2020Updated 5 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- ☆22Aug 31, 2016Updated 9 years ago