A mapping of used malware names to commonly known family names
☆63Feb 21, 2023Updated 3 years ago
Alternatives and similar repositories for malware_name_mapping
Users that are interested in malware_name_mapping are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web interface to IntelMQ☆10Mar 26, 2026Updated last month
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Jun 11, 2020Updated 5 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- IntelMQ Manager is a graphical interface to manage configurations for IntelMQ framework.☆108Dec 3, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 7 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Automated handling of data feeds for security teams☆148Dec 31, 2025Updated 3 months ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Validate STIX and CybOX XML documents☆26Feb 16, 2024Updated 2 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆92Apr 7, 2026Updated 3 weeks ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆51Sep 6, 2023Updated 2 years ago
- Python script to automatically create sigma rules from The hive observables