☆18Mar 26, 2024Updated last year
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below
Sorting:
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- NTFS samples☆27Aug 1, 2020Updated 5 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- ☆11Aug 31, 2023Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- MS Graph Commands and Tools for Blue Teamers☆51Feb 4, 2026Updated 3 weeks ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- ☆12Jun 29, 2021Updated 4 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Repository for archiving Cobalt Strike configuration☆36Updated this week
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- ☆16Oct 18, 2024Updated last year
- ☆39Jan 24, 2024Updated 2 years ago
- ☆23Mar 17, 2024Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 5 months ago
- This Binary Ninja plugin is written in Python 3 and it aims to assist with reverse engineering and vulnerability research. It dumps the P…☆47Jan 28, 2023Updated 3 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 12 years ago