codingo / Ransomware-Json-Dataset
Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ransomware.
☆67Updated last year
Related projects: ⓘ
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆80Updated 3 years ago
- Mass static malware analysis tool☆91Updated 2 years ago
- Malquarium - Modern Malware Repository☆47Updated 4 years ago
- Various scripts for different malware families☆106Updated 3 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆63Updated 4 months ago
- A curated list of malware repositories, trackers and malware analysis tools☆79Updated last year
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Updated 4 years ago
- Repository of yara rules☆57Updated last year
- Sandbox feature upgrade with the help of wrapped samples☆75Updated 6 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆42Updated 2 years ago
- A short and small memory forensics helper.☆52Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆77Updated 4 years ago
- Some YARA rules i will add from time to time☆60Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆56Updated 4 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 5 years ago
- ☆50Updated 6 years ago
- A Python malware analysis library.☆50Updated last year
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆19Updated 2 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆78Updated 3 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆80Updated 6 years ago
- A warehouse for your malware☆131Updated 11 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Updated last year
- ☆42Updated 4 years ago
- ☆54Updated 4 years ago
- Collection of YARA signatures from individual research☆41Updated 10 months ago
- Landing page for MAEC docs☆20Updated last year
- Malware captured with honeypots☆35Updated 6 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆36Updated last year
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 5 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆102Updated 6 years ago