hashlookup / hashlookup-guiLinks
Provides a multi-platform Graphical User Interface for hashlookup
☆12Updated last year
Alternatives and similar repositories for hashlookup-gui
Users that are interested in hashlookup-gui are comparing it to the libraries listed below
Sorting:
- Collection of generic YARA rules☆16Updated 4 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆23Updated 2 years ago
- Links to malware-related YARA rules☆15Updated 3 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- ☆18Updated last year
- QuasarRAT analysis tools and research report☆27Updated 2 years ago
- Symantec EDR Internals☆29Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- ☆36Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- Help deobfuscate VBScript☆17Updated 3 years ago
- Tracking APT IOCs☆25Updated 5 years ago
- ☆27Updated last year
- Repository for LNK stuff☆31Updated 3 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆11Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- ☆19Updated last year
- LILO based Pulse Secure appliance disk image decryptor☆13Updated last year
- ☆24Updated last year
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- ProcDot Malware Sandbox☆25Updated 4 months ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Updated 4 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 10 months ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- ☆12Updated 4 years ago