Collection of Malware Lures
☆23Oct 8, 2021Updated 4 years ago
Alternatives and similar repositories for malware_lure
Users that are interested in malware_lure are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 4 years ago
- ☆19Sep 21, 2020Updated 5 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- JPCERT/CC public YARA rules repository☆111Mar 9, 2026Updated 2 months ago
- View contents of Visual Studio SUO files☆23Apr 23, 2026Updated 3 weeks ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆33Sep 26, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A tool to extract RTTI information from Delphi executables, written in pure Python☆23Mar 11, 2020Updated 6 years ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 9 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- Yara scan Phishing Kit's Zip archive(s)☆62Jun 20, 2025Updated 11 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 11 months ago
- ☆96Apr 8, 2026Updated last month
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆19Dec 8, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Talk slides and material☆38Mar 24, 2024Updated 2 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- ☆50Jan 13, 2020Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆23Jul 2, 2015Updated 10 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- Các IDA Flirt signatures HTC tạo☆21Oct 21, 2024Updated last year
- suite of binaries used to test function identification☆28Nov 7, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Code for the paper: "Abide by the Law and Follow the Flow: Conservation Laws for Gradient Flows".☆12Feb 24, 2024Updated 2 years ago
- ☆23Aug 19, 2017Updated 8 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 5 years ago
- A golang CLI tool to download malware from a variety of sources.☆151Jul 3, 2025Updated 10 months ago