hpthreatresearch / tools
Scripts and tools accompanying HP Threat Research blog posts and reports.
☆50Updated 11 months ago
Alternatives and similar repositories for tools:
Users that are interested in tools are comparing it to the libraries listed below
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆58Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- ☆14Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆17Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆97Updated 2 months ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- JPCERT/CC public YARA rules repository☆106Updated 3 months ago
- Python based CLI for MalwareBazaar☆36Updated 4 months ago
- Standardized Malware Analysis Tool☆52Updated 4 years ago
- Powershell sandboxing utility☆18Updated last week
- ☆15Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- ☆21Updated 2 years ago
- ☆34Updated 2 years ago
- Yara rules☆20Updated last year
- Scripts and lists to help generate YARA friendly string mutations☆20Updated last year
- ☆44Updated last year
- Yara Rules for Modern Malware☆73Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- Threat Box Assessment Tool☆19Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A home for detection content developed by the delivr.to team☆67Updated last month
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆52Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated 10 months ago
- ☆86Updated last year
- ☆27Updated 3 years ago
- Hunt malware with Volatility☆48Updated 10 months ago