Standardized Malware Analysis Tool
☆56Mar 9, 2021Updated 4 years ago
Alternatives and similar repositories for SMAT
Users that are interested in SMAT are comparing it to the libraries listed below
Sorting:
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 7 months ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- Python scripts for Malware Bazaar☆157Jun 3, 2024Updated last year
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- Hatching Triage public command-line utility and API library.☆75Oct 9, 2023Updated 2 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- A few scripts I put together to send and receive data from an Azure Log Analytics workspace leveraging the Azure Monitor HTTP Data Collec…☆22May 22, 2023Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆168Dec 10, 2018Updated 7 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Memory Loader Open Source Project by Sentinel-Labs.☆25Mar 26, 2021Updated 4 years ago
- https://wojciechregula.blog/post/macos-red-teaming-get-ad-credentials-from-nomad/☆43Mar 4, 2022Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆272May 5, 2021Updated 4 years ago
- Detect kerberos attacks in pcap files☆29Dec 13, 2015Updated 10 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- XOR Key Extractor☆51Aug 10, 2024Updated last year