Hatching Triage public command-line utility and API library.
☆75Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for triage
Users that are interested in triage are comparing it to the libraries listed below
Sorting:
- Client library for the mwdb service by CERT Polska.☆42Feb 10, 2026Updated last month
- Standardized Malware Analysis Tool☆56Mar 9, 2021Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- ☆17Jan 22, 2026Updated last month
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Malduck is your ducky companion in malware analysis journeys☆350Jun 22, 2025Updated 8 months ago
- ☆83Jan 31, 2020Updated 6 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Sep 24, 2023Updated 2 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆465Updated this week
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- ☆16Apr 30, 2024Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆516May 14, 2024Updated last year
- Malware repository component for samples & static configuration with REST API interface.☆381Updated this week
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34May 21, 2019Updated 6 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆42Jan 31, 2025Updated last year
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 9 months ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- The Threat Actor Profile Guide for CTI Analysts☆117Jul 15, 2023Updated 2 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- I am a simple shell script that downloads all repositories from a user and then hunts them for sh1t.☆11Jul 21, 2022Updated 3 years ago
- A collection of modules and scripts to help with analyzing Nim binaries☆83Oct 7, 2024Updated last year
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Minimal, consistent Python API for building integrations with malware sandboxes.☆142Jan 31, 2024Updated 2 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- Everything related to YARA☆16Feb 19, 2026Updated last month
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆132Nov 25, 2023Updated 2 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 2 months ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆116Mar 2, 2026Updated 2 weeks ago
- ☆22Dec 22, 2020Updated 5 years ago
- Community modules for CAPE Sandbox☆111Mar 11, 2026Updated last week