hashlookup / hashlookup-gui
Provides a multi-platform Graphical User Interface for hashlookup
☆12Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for hashlookup-gui
- Links to malware-related YARA rules☆14Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆22Updated 8 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- Unpacker for donut shellcode☆10Updated 4 years ago
- Command-line tool to search for malware samples in various repositories☆10Updated 2 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆12Updated 3 years ago
- Specialized tool to dump Position Independent Code.☆21Updated 4 years ago
- Python based CLI for MalwareBazaar☆36Updated 3 weeks ago
- Symantec EDR Internals☆25Updated 3 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated 9 months ago
- Modular malware analysis artifact collection and correlation framework☆52Updated 6 months ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆11Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- ☆18Updated 7 months ago
- Collection of generic YARA rules☆14Updated 5 months ago
- ☆31Updated 2 years ago
- Yara rules☆20Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Go library to allow native inline hooking in windows at runtime☆13Updated 9 months ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated last year
- Imphash-like calculation on Golang binaries☆47Updated 2 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 2 months ago
- ☆21Updated last year
- Collection of IoCs available and related to attacks on ESXi infrastructures that occurred as of Friday February 3, 2023.☆12Updated last year
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago