Vthunting is a tiny script used to generate report about Virus Total hunting and send it by email, slack or telegram.
☆169Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for vthunting
Users that are interested in vthunting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python 3 implementation of the VirusTotal v3 API☆82Jan 26, 2023Updated 3 years ago
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆119Jun 19, 2019Updated 6 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago
- Awesome VirusTotal Intelligence Search Queries☆333May 16, 2023Updated 2 years ago
- emotet configs pulled from https://cape.contextis.com/☆15Apr 27, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 3 years ago
- A phishing kit collector for scavengers☆221Jan 22, 2026Updated 2 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- Pattern Extractor for Obfuscated Code☆302Feb 12, 2022Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated last year
- Malware Configuration And Payload Extraction☆20Feb 12, 2020Updated 6 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 2 months ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- Generating YARA rules based on binary code☆221Oct 7, 2021Updated 4 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- IDA python plugin to scan binary with Yara rules☆181Jan 30, 2024Updated 2 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Dec 8, 2022Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Defanged Indicator of Compromise (IOC) Extractor.☆571Aug 28, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆46Apr 6, 2017Updated 8 years ago
- Find abuse contacts for observables☆69Nov 10, 2022Updated 3 years ago
- Official VirusTotal plugin for IDA Pro☆181Feb 4, 2026Updated last month
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 5 months ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- ☆15Dec 16, 2020Updated 5 years ago