funtimes-ninja / malware
Malware samples from honeypots
☆71Updated 7 years ago
Alternatives and similar repositories for malware:
Users that are interested in malware are comparing it to the libraries listed below
- A warehouse for your malware☆134Updated 11 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 4 years ago
- Malware Repository Framework☆100Updated 7 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Updated 9 years ago
- A collection of infosec related scripts and information.☆53Updated 6 months ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- ☆68Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Mitre chopshop network decoder framework☆30Updated 8 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Suricata rules for Emerging Threats and funkyness☆74Updated 7 years ago
- ☆75Updated 3 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- Manage VT Alerts☆62Updated 8 years ago
- Yara rules☆48Updated 11 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- Some IR notes☆73Updated 8 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆88Updated 9 years ago
- An ICAP Server with yara scanner for URL and content.☆59Updated 3 months ago
- Simple DDE object detector☆56Updated 7 years ago
- Quick tool for using Hybrid Analysis API on command line..☆17Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 7 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- ☆22Updated 7 years ago
- integrating bro into yara☆33Updated 10 years ago