malice-plugins / get-mauledLinks
Download a Bunch of Malware for Demos and Testing
☆13Updated 7 years ago
Alternatives and similar repositories for get-mauled
Users that are interested in get-mauled are comparing it to the libraries listed below
Sorting:
- Some rules, scripts of some use to us☆11Updated last year
- Community-based integrated malware identification system☆81Updated 3 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 7 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Updated 5 years ago
- Malice Office/OLE/RTF Plugin☆13Updated 7 years ago
- Handy scripts to speed up malware analysis☆35Updated 2 years ago
- Yara rules for detecting malware☆23Updated 4 months ago
- Plugins for the Viper Framework☆14Updated 6 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Updated 5 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- ☆27Updated 2 years ago
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Updated 7 years ago
- Client library for the mwdb service by CERT Polska.☆42Updated 4 months ago
- ☆49Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 7 years ago
- ☆28Updated 8 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- CLI tool to analyze PE files☆90Updated last year
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- Extract GUIDs from .NET assemblies☆21Updated 9 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 9 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 9 years ago
- Malware similarity platform with modularity in mind.☆80Updated 4 years ago