hatching / triage
Hatching Triage public command-line utility and API library.
☆66Updated last year
Alternatives and similar repositories for triage:
Users that are interested in triage are comparing it to the libraries listed below
- Various capabilities for static malware analysis.☆77Updated 5 months ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆99Updated last week
- Random hunting ordiented yara rules☆95Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- JPCERT/CC public YARA rules repository☆106Updated 2 months ago
- A Python package and command line utility for scanning emails with YARA rules☆20Updated this week
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 10 months ago
- Simple yara rule manager☆66Updated 2 years ago
- Python based CLI for MalwareBazaar☆36Updated 3 months ago
- Collection of rules created using YARA-Signator over Malpedia☆127Updated 3 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated last year
- Hunt malware with Volatility☆47Updated 9 months ago
- Standardized Malware Analysis Tool☆52Updated 3 years ago
- ☆22Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆96Updated last month
- A guide on how to write fast and memory friendly YARA rules☆136Updated last week
- MWDB exercises☆19Updated last month
- Digital Forensics Artifacts Knowledge Base☆77Updated 9 months ago
- Malware Configuration Extraction Modules☆48Updated last year
- VirusTotal Intelligence Search☆35Updated 4 years ago
- Valhalla API Client☆67Updated 2 years ago
- This repository contains files from AppGate / Immunity Malware Analysis Team.☆21Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- ☆86Updated last year
- ☆130Updated last year
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆61Updated 2 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆72Updated 2 months ago