k-vitali / Malware-Misc-REView external linksLinks
Miscellaneous Malware RE
☆195May 1, 2022Updated 3 years ago
Alternatives and similar repositories for Malware-Misc-RE
Users that are interested in Malware-Misc-RE are comparing it to the libraries listed below
Sorting:
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- ☆14Jun 5, 2019Updated 6 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆120Apr 30, 2019Updated 6 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Nov 25, 2023Updated 2 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Oct 26, 2022Updated 3 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,914Jan 30, 2026Updated 2 weeks ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 2 years ago
- ☆714Oct 28, 2022Updated 3 years ago
- ☆136Jan 24, 2019Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated 11 months ago
- YARA signature and IOC database for my scanners and tools☆2,864Feb 5, 2026Updated last week
- Artifact analysis tools by JPCERT/CC Analysis Center☆464Aug 14, 2025Updated 6 months ago
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- IOC from articles, tweets for archives☆317Dec 12, 2023Updated 2 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆587May 5, 2024Updated last year
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆380Apr 28, 2020Updated 5 years ago
- Repository of YARA rules made by Trellix ATR Team☆623Mar 18, 2025Updated 10 months ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Dec 12, 2021Updated 4 years ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 6 years ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆264Jan 15, 2022Updated 4 years ago
- For all these times you're asking yourself "what is this panel again?"☆258Jan 29, 2026Updated 2 weeks ago
- ☆83Jan 31, 2020Updated 6 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- A VBA p-code disassembler☆483Jun 12, 2021Updated 4 years ago
- ☆128Feb 2, 2025Updated last year
- Malduck is your ducky companion in malware analysis journeys☆349Jun 22, 2025Updated 7 months ago