☆18Mar 26, 2024Updated 2 years ago
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆58Dec 31, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- MS Graph Commands and Tools for Blue Teamers☆51Feb 4, 2026Updated 3 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated 2 months ago
- ☆23Mar 17, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆61Apr 16, 2024Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- NTFS samples☆27Aug 1, 2020Updated 5 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Jul 7, 2022Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A small util to brute-force prefetch hashes☆76Jun 24, 2022Updated 3 years ago
- Log4j Exploit Detection Logic for Zeek☆19Nov 25, 2025Updated 5 months ago
- ☆20Oct 23, 2020Updated 5 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆38Jan 24, 2024Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- Easy peasy file uploads☆35May 12, 2026Updated last week
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆57May 8, 2026Updated last week
- ☆16Apr 14, 2020Updated 6 years ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 3 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆122Dec 13, 2025Updated 5 months ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Apr 15, 2026Updated last month
- Repository for archiving Cobalt Strike configuration☆35Updated this week