nao-sec / tknk_scanner
Community-based integrated malware identification system
☆82Updated 2 years ago
Alternatives and similar repositories for tknk_scanner:
Users that are interested in tknk_scanner are comparing it to the libraries listed below
- Telsy CTI Research Team☆57Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Updated last year
- Handy scripts to speed up malware analysis☆35Updated last year
- Static based decoders for malware samples☆92Updated 4 years ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- ☆42Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Trace ScriptBlock execution for powershell v2☆39Updated 5 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- A Maltego transform for VirusTotal vHash☆31Updated 5 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 6 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆82Updated last year
- ☆26Updated last year
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- ☆47Updated 5 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆49Updated 5 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 6 years ago
- A Maltego transform for VirusTotal Submitter Information☆32Updated 5 years ago
- Sandbox feature upgrade with the help of wrapped samples☆75Updated 6 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆41Updated 6 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆71Updated last month
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 4 years ago