Miscellaneous Malware RE
☆193May 1, 2022Updated 3 years ago
Alternatives and similar repositories for Malware-Misc-RE
Users that are interested in Malware-Misc-RE are comparing it to the libraries listed below
Sorting:
- ☆23Aug 1, 2020Updated 5 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆120Apr 30, 2019Updated 6 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆132Nov 25, 2023Updated 2 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- ☆129Feb 2, 2025Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- ☆136Jan 24, 2019Updated 7 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Malware Configuration And Payload Extraction☆762Nov 22, 2024Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,933Mar 10, 2026Updated last week
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated last year
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- ☆715Oct 28, 2022Updated 3 years ago
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated last week
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 7 months ago
- ☆83Jan 31, 2020Updated 6 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- For all these times you're asking yourself "what is this panel again?"☆261Jan 29, 2026Updated last month
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆240Jul 22, 2021Updated 4 years ago
- Malduck is your ducky companion in malware analysis journeys☆350Jun 22, 2025Updated 8 months ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 6 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆381Apr 28, 2020Updated 5 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- Contains poc's and my research works☆31Feb 13, 2023Updated 3 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆474Dec 12, 2021Updated 4 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago