☆18Mar 26, 2024Updated last year
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below
Sorting:
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- MS Graph Commands and Tools for Blue Teamers☆51Feb 4, 2026Updated last month
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 7 months ago
- ☆23Mar 17, 2024Updated 2 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated last year
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- NTFS samples☆27Aug 1, 2020Updated 5 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Jul 7, 2022Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- A small util to brute-force prefetch hashes☆77Jun 24, 2022Updated 3 years ago
- Log4j Exploit Detection Logic for Zeek☆19Nov 25, 2025Updated 3 months ago
- ☆19Oct 23, 2020Updated 5 years ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆39Jan 24, 2024Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- ☆55Mar 5, 2026Updated 2 weeks ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 3 months ago