cod3nym / detection-rules
Collection of my own detection rules
☆14Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for detection-rules
- ☆31Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- ☆27Updated 3 months ago
- ☆13Updated 6 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- General malware analysis stuff☆35Updated 2 months ago
- Repo containing my public talks☆22Updated last year
- Modular malware analysis artifact collection and correlation framework☆52Updated 6 months ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated last year
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆23Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- ☆34Updated last year
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆51Updated 2 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- ☆25Updated last month
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Specialized tool to dump Position Independent Code.☆21Updated 4 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 4 months ago
- ☆14Updated 2 years ago
- A set of tools for collecting forensic information☆26Updated 4 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 3 years ago
- Tools helpful for malware analysis☆22Updated 3 months ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆22Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆26Updated last month
- ☆44Updated last year
- My Malware Analysis Reports☆18Updated 2 years ago