joesecurity / awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
☆21Updated 7 years ago
Alternatives and similar repositories for awesome-malware-analysis:
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
- Community modules for FAME☆65Updated 2 months ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆83Updated last year
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- ☆44Updated 6 years ago
- Yara rules for detecting malware☆23Updated 7 months ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆72Updated 4 months ago
- Python API wrapper for the Joe Sandbox API.☆67Updated last year
- Yara rules to be used with the Burp Yara-Scanner extension☆48Updated 3 years ago
- VSCode extension for the YARA pattern matching language☆64Updated last year
- Tools for parsing rulesets using the exact grammar as YARA. Written in Go.☆83Updated 2 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated 4 months ago
- Automated install scripts for Cuckoo sandbox☆37Updated 7 years ago
- Messing around with clamav sigs☆26Updated 4 years ago
- ☆33Updated 4 years ago
- ☆125Updated 2 months ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- Cuckoo Agent.☆23Updated 6 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Python IOC Editor☆62Updated 10 years ago
- Client library for the mwdb service by CERT Polska.☆40Updated 5 months ago
- ☆53Updated 4 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆98Updated 2 months ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Repository containing IOCs, CSV and MISP JSON from our blogs☆81Updated 3 years ago
- Providing timelines based on OSINT Reports☆32Updated last year
- Collection of YARA signatures from individual research☆44Updated last year
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago