Collection of Malware Lures
☆23Oct 8, 2021Updated 4 years ago
Alternatives and similar repositories for malware_lure
Users that are interested in malware_lure are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- File Capability Extractor☆14Jul 12, 2025Updated 8 months ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- ☆19Sep 21, 2020Updated 5 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- JPCERT/CC public YARA rules repository☆109Mar 9, 2026Updated 2 weeks ago
- ☆37May 8, 2022Updated 3 years ago
- View contents of Visual Studio SUO files☆23Jan 22, 2021Updated 5 years ago
- A tool to extract RTTI information from Delphi executables, written in pure Python☆23Mar 11, 2020Updated 6 years ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 7 months ago
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆21Sep 26, 2019Updated 6 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- This is creating a TCP Server using Rust programming language☆14Oct 3, 2023Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- ☆96May 5, 2025Updated 10 months ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆19Dec 8, 2022Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Talk slides and material☆38Mar 24, 2024Updated last year
- ☆49Jan 13, 2020Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆22Jul 2, 2015Updated 10 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- Các IDA Flirt signatures HTC tạo☆20Oct 21, 2024Updated last year
- suite of binaries used to test function identification☆28Nov 7, 2017Updated 8 years ago