danielpoliakov / lisa
Sandbox for automated Linux malware analysis.
☆475Updated last year
Related projects: ⓘ
- Distributed malware processing framework based on Python, Redis and S3.☆381Updated last week
- MBC content in markdown☆359Updated this week
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆697Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆519Updated this week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,032Updated last week
- Malduck is your ducky companion in malware analysis journeys☆313Updated 3 months ago
- Online hash checker for Virustotal and other services☆808Updated 4 months ago
- ReversingLabs YARA Rules☆744Updated last week
- Malware repository component for samples & static configuration with REST API interface.☆317Updated this week
- YARA malware query accelerator (web frontend)☆407Updated this week
- Collaborative Malware Analysis Platform at Scale☆688Updated this week
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆881Updated 5 months ago
- Malware sample library.☆547Updated 9 months ago
- IOC from articles, tweets for archives☆310Updated 9 months ago
- ☆503Updated last month
- Repository of YARA rules made by Trellix ATR Team☆560Updated 8 months ago
- Malware Configuration And Payload Extraction☆743Updated last year
- YARA Rules I come across on the internet☆327Updated 5 months ago
- Collection of private Yara rules.☆317Updated last month
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,101Updated 9 months ago
- Python scripts for Malware Bazaar☆138Updated 3 months ago
- yarGen is a generator for YARA rules☆1,533Updated 3 months ago
- Volatility plugin for extracts configuration data of known malware☆481Updated 8 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆568Updated 4 months ago
- Indicators from Unit 42 Public Reports☆696Updated last week
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆513Updated 2 weeks ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆360Updated 2 years ago
- Open Source EDR for Windows☆1,137Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,602Updated last week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆658Updated last month