cocaman / malware-bazaarLinks
Python scripts for Malware Bazaar
☆157Updated last year
Alternatives and similar repositories for malware-bazaar
Users that are interested in malware-bazaar are comparing it to the libraries listed below
Sorting:
- Malware Sandboxes & Malware Source☆109Updated 8 years ago
- Collection of rules created using YARA-Signator over Malpedia☆142Updated last month
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆115Updated last month
- Community modules for CAPE Sandbox☆110Updated last week
- Security ML models encoded as Yara rules☆215Updated 2 years ago
- Collection of private Yara rules.☆378Updated last week
- Malware repository component for samples & static configuration with REST API interface.☆373Updated this week
- A guide on how to write fast and memory friendly YARA rules☆164Updated 11 months ago
- Automatic YARA rule generation for Malpedia☆167Updated 3 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆461Updated 2 months ago
- Malduck is your ducky companion in malware analysis journeys☆349Updated 7 months ago
- c2 traffic☆194Updated 3 years ago
- Hatching Triage public command-line utility and API library.☆74Updated 2 years ago
- ☆128Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆121Updated 3 years ago
- File analysis and management framework.☆92Updated 2 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388Updated 3 years ago
- YARA malware query accelerator (web frontend)☆437Updated last week
- ☆163Updated 3 years ago
- Set of Yara rules for finding files using magics headers☆142Updated 5 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆184Updated 4 months ago
- Parse YARA rules and operate over them more easily.☆195Updated last year
- ☆215Updated 8 months ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆339Updated last year
- IOC from articles, tweets for archives☆318Updated 2 years ago
- ☆129Updated 2 years ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆247Updated last year
- YARA Rules I come across on the internet☆358Updated last year
- Various capabilities for static malware analysis.☆79Updated last year
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 3 years ago