malice-plugins / get-mauledLinks
Download a Bunch of Malware for Demos and Testing
☆13Updated 6 years ago
Alternatives and similar repositories for get-mauled
Users that are interested in get-mauled are comparing it to the libraries listed below
Sorting:
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- Malice Office/OLE/RTF Plugin☆13Updated 6 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Basic file metadata gathering script☆21Updated 2 months ago
- ☆27Updated last year
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 8 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- ☆47Updated 5 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Updated 6 years ago
- ☆18Updated 2 years ago
- Yara rules for detecting malware☆23Updated 9 months ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Updated 7 months ago
- QEMU with rVMI extensions☆25Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago