A collection of my reverse engineering and malware analysis write-ups
☆21Dec 11, 2020Updated 5 years ago
Alternatives and similar repositories for Malware-Writeups
Users that are interested in Malware-Writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- Various Tutorials☆211Feb 8, 2026Updated last month
- ☆17Nov 12, 2017Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- My collection of unpackers for malware packers/crypters☆28Aug 24, 2017Updated 8 years ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- ☆14Feb 12, 2026Updated last month
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- ☆15Feb 22, 2021Updated 5 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- ☆24Jul 6, 2018Updated 7 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆26Nov 23, 2017Updated 8 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- static malware analysis and report tool open source version for linux☆17Jun 17, 2017Updated 8 years ago
- ☆19May 18, 2025Updated 10 months ago
- Let's try to create a rootkit!☆19Mar 6, 2020Updated 6 years ago