Collection of scripts for different malware analysis tasks
☆76Jul 15, 2019Updated 6 years ago
Alternatives and similar repositories for malware-analysis-scripts
Users that are interested in malware-analysis-scripts are comparing it to the libraries listed below
Sorting:
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Mass static malware analysis tool☆94Feb 13, 2022Updated 4 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- Offline debugger for malware's reverse engineering☆116Jan 21, 2015Updated 11 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Autoruns plugin for the Volatility framework☆122Jul 18, 2019Updated 6 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- ☆64Feb 12, 2022Updated 4 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆68Jan 21, 2018Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- Cyber Intel Management☆51Jan 25, 2018Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Malware Behavior Analyzer☆158Jun 1, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Virustotal Lookup filter for Logstash☆16May 11, 2017Updated 8 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- An advanced memory forensics framework☆25Sep 25, 2014Updated 11 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Watchtower, monitoring your Slack workspaces.☆16Jan 26, 2021Updated 5 years ago
- Malware Classification using Graph Clustering☆14Nov 12, 2012Updated 13 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 8 months ago