Collection of Malware Lures
☆23Oct 8, 2021Updated 4 years ago
Alternatives and similar repositories for malware_lure
Users that are interested in malware_lure are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated last month
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- File Capability Extractor☆15Jul 12, 2025Updated 9 months ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆19Sep 21, 2020Updated 5 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- JPCERT/CC public YARA rules repository☆111Mar 9, 2026Updated last month
- ☆37May 8, 2022Updated 3 years ago
- View contents of Visual Studio SUO files☆23Apr 23, 2026Updated last week
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆33Sep 26, 2024Updated last year
- A tool to extract RTTI information from Delphi executables, written in pure Python☆23Mar 11, 2020Updated 6 years ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The ultimate Red Team toolkit for phishing operations.☆54Updated this week
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆21Sep 26, 2019Updated 6 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 10 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 11 months ago
- ☆96Apr 8, 2026Updated 3 weeks ago
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆19Dec 8, 2022Updated 3 years ago
- Talk slides and material☆38Mar 24, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- ☆50Jan 13, 2020Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆22Jul 2, 2015Updated 10 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year