nao-sec / ektotal
[BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack
☆107Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ektotal
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated 11 months ago
- Analyzing Rig Exploit Kit☆50Updated 7 years ago
- Community-based integrated malware identification system☆82Updated last year
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- Application for STIX v2.0 objects management and analysis☆27Updated 7 years ago
- snake - a malware storage zoo☆217Updated last year
- A collection of infosec related scripts and information.☆53Updated last month
- a modified version base on Tracecorn☆20Updated 5 years ago
- Simple DDE object detector☆55Updated 6 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆105Updated 4 years ago
- Various scripts for different malware families☆105Updated 3 years ago
- RAT / Botnet Simulator for pentest / education☆80Updated 5 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 10 years ago
- Simple high-interactive client honeypot☆24Updated 7 years ago
- Tool for dropping malware from EK☆41Updated 6 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆255Updated 5 years ago
- Malware/IOC ingestion and processing engine☆103Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆77Updated 4 years ago
- ☆134Updated 5 years ago
- A Yara rule generator for finding related samples and hunting☆157Updated 2 years ago
- A warehouse for your malware☆133Updated 11 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆81Updated 3 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- ☆68Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- Collection of YARA signatures from individual research☆42Updated last year
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 7 years ago