mandiant / stringsifter
A machine learning tool that ranks strings based on their relevance for malware analysis.
☆675Updated 2 months ago
Related projects: ⓘ
- YARA malware query accelerator (web frontend)☆407Updated this week
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆697Updated last year
- Pattern Extractor for Obfuscated Code☆295Updated 2 years ago
- Malware Configuration And Payload Extraction☆743Updated last year
- An open source script to perform malware static analysis on Portable Executable☆309Updated last year
- IOC from articles, tweets for archives☆310Updated 9 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆519Updated this week
- A Python package to interact with the Mitre ATT&CK Framework☆467Updated 11 months ago
- Volatility plugin for extracts configuration data of known malware☆481Updated 9 months ago
- Online hash checker for Virustotal and other services☆808Updated 4 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆381Updated last week
- Extract and aggregate threat intelligence.☆820Updated 7 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,044Updated 2 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,032Updated last week
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,101Updated 9 months ago
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆232Updated last year
- YARA Rules I come across on the internet☆327Updated 5 months ago
- MBC content in markdown☆359Updated this week
- FAME Automates Malware Evaluation☆845Updated 2 weeks ago
- Repository of YARA rules made by Trellix ATR Team☆560Updated 9 months ago
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆529Updated last year
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆881Updated 5 months ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆360Updated 2 years ago
- ReversingLabs YARA Rules☆744Updated last week
- Forensics artefact collection tool for systems running Microsoft Windows☆372Updated 3 weeks ago
- Binee: binary emulation environment☆500Updated last year
- Malware repository component for samples & static configuration with REST API interface.☆317Updated this week
- For all these times you're asking yourself "what is this panel again?"☆251Updated last year
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆444Updated last year
- Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.☆609Updated 4 years ago