Automation for VirusTotal
☆31May 6, 2016Updated 9 years ago
Alternatives and similar repositories for vt-hunter
Users that are interested in vt-hunter are comparing it to the libraries listed below
Sorting:
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Yara rules for malware families seen as part of targeted threats project☆141Nov 17, 2016Updated 9 years ago
- Scripts and parsers to facilitate data visualization with various tools.☆21May 3, 2015Updated 10 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- ☆10Jun 13, 2014Updated 11 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- A simple tool for bulk adding/updating/removing tags from AWS resources.☆13Jan 8, 2016Updated 10 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago