citizenlab / malware-indicatorsLinks
Citizen Lab Malware Reports
☆276Updated 5 years ago
Alternatives and similar repositories for malware-indicators
Users that are interested in malware-indicators are comparing it to the libraries listed below
Sorting:
- Yara rules for malware families seen as part of targeted threats project☆141Updated 8 years ago
- Collection of IOCs related to targeting of civil society☆189Updated 3 years ago
- 16,432 Free Yara rules created by☆389Updated 6 years ago
- A generic interface and CLI for all endpoints of the Falcon Sandbox API☆220Updated last year
- CRITs Services Collection☆184Updated 4 years ago
- Scripts to analyze stuff☆146Updated 2 months ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆132Updated 9 years ago
- ☆205Updated 2 years ago
- A collection of infosec related scripts and information.☆53Updated last year
- VirusTotal Full api☆304Updated 2 years ago
- Automatic Yara Rule Generation☆333Updated 9 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆35Updated 9 years ago
- Set of Yara rules for finding files using magics headers☆140Updated 5 years ago
- Malware static analysis framework☆180Updated 5 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 3 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Updated 2 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆175Updated 4 years ago
- ☆152Updated 6 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆146Updated 2 years ago
- A modular Python application to pull intelligence about malicious files☆122Updated 4 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆138Updated 6 months ago
- Django web interface for managing Yara rules☆195Updated 7 years ago
- Tools to interact with APTnotes reporting/index.☆104Updated 4 years ago
- Differential Analysis of Malware in Memory☆212Updated 8 years ago
- ☆173Updated 4 years ago
- Set of tools for interacting with Malshare☆157Updated 5 years ago
- A Yara rule generator for finding related samples and hunting☆159Updated 3 years ago
- Docker container for MISP☆96Updated 7 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆82Updated 9 years ago
- A framework for receiving and redistributing abuse feeds☆124Updated 6 years ago