jstrosch / hybrid-analysis-api
This is a small Python3 script that allows you to search and download samples from Hybrid Analysis' v2 API
☆9Updated 5 years ago
Alternatives and similar repositories for hybrid-analysis-api:
Users that are interested in hybrid-analysis-api are comparing it to the libraries listed below
- ☆23Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 4 years ago
- ☆22Updated last year
- A Linux RAT in C☆31Updated 6 years ago
- ☆22Updated 4 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- QuasarRAT analysis tools and research report☆25Updated last year
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Work in Progress repo☆14Updated 5 years ago
- ☆16Updated 3 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆12Updated 3 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆11Updated 4 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆15Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Tool to manage user privileges☆28Updated 5 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆54Updated 3 weeks ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- Simulates a logged in user.☆16Updated 7 months ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- ☆24Updated 5 years ago