citizenlab / malware-indicators
Citizen Lab Malware Reports
☆273Updated 4 years ago
Alternatives and similar repositories for malware-indicators:
Users that are interested in malware-indicators are comparing it to the libraries listed below
- Yara rules for malware families seen as part of targeted threats project☆135Updated 8 years ago
- Collection of IOCs related to targeting of civil society☆188Updated 3 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆463Updated 6 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 2 years ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆550Updated this week
- Automatic Yara Rule Generation☆331Updated 9 years ago
- 16,432 Free Yara rules created by☆381Updated 5 years ago
- Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.☆268Updated last week
- A modular Python application to pull intelligence about malicious files☆119Updated 4 years ago
- Tools to interact with APTnotes reporting/index.☆99Updated 4 years ago
- DPS' Lightweight Investigation Notebook☆427Updated last year
- Django web interface for managing Yara rules☆190Updated 6 years ago
- Open Source Threat Intelligence Chat Bot☆321Updated 4 years ago
- VirusTotal Full api☆294Updated last year
- ☆151Updated 6 years ago
- Malware static analysis framework☆176Updated 4 years ago
- ☆201Updated last year
- Threat Intelligence APIs☆276Updated last year
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆241Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆434Updated last year
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆173Updated 9 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆497Updated 2 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 3 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆306Updated last week
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆173Updated 7 months ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆259Updated 6 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- A repository of tools and scripts related to malware analysis☆246Updated 8 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆142Updated 2 years ago
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆352Updated this week