Hatching Triage public command-line utility and API library.
☆74Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for triage
Users that are interested in triage are comparing it to the libraries listed below
Sorting:
- Client library for the mwdb service by CERT Polska.☆42Feb 10, 2026Updated 2 weeks ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Standardized Malware Analysis Tool☆56Mar 9, 2021Updated 4 years ago
- ☆17Jan 22, 2026Updated last month
- Malduck is your ducky companion in malware analysis journeys☆349Jun 22, 2025Updated 8 months ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- Cockroach is your primitive & immortal swiss army knife.☆48Dec 8, 2021Updated 4 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆461Dec 1, 2025Updated 2 months ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆516May 14, 2024Updated last year
- ☆16Apr 30, 2024Updated last year
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- Malware repository component for samples & static configuration with REST API interface.☆376Updated this week
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34May 21, 2019Updated 6 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Community modules for FAME☆65Dec 16, 2025Updated 2 months ago
- ☆83Jan 31, 2020Updated 6 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- A golang CLI tool to download malware from a variety of sources.☆151Jul 3, 2025Updated 7 months ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Aug 4, 2016Updated 9 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- I am a simple shell script that downloads all repositories from a user and then hunts them for sh1t.☆11Jul 21, 2022Updated 3 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Scripts and code referenced in CrowdStrike blog posts☆337Nov 13, 2019Updated 6 years ago