☆715Oct 28, 2022Updated 3 years ago
Alternatives and similar repositories for public_tools
Users that are interested in public_tools are comparing it to the libraries listed below
Sorting:
- Indicators from Unit 42 Public Reports☆728Aug 17, 2025Updated 6 months ago
- ☆176Jun 25, 2024Updated last year
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆960Aug 28, 2025Updated 6 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,089Dec 9, 2025Updated 2 months ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 6 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,922Feb 20, 2026Updated last week
- YARA signature and IOC database for my scanners and tools☆2,874Feb 5, 2026Updated 3 weeks ago
- Python Decoders for Common Remote Access Trojans☆1,116Jul 16, 2024Updated last year
- Kaspersky's GReAT KLara☆732Jul 24, 2024Updated last year
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- yarGen is a generator for YARA rules☆1,776Jan 10, 2026Updated last month
- Interesting APT Report Collection And Some Special IOCs☆2,915Feb 24, 2026Updated last week
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆262Mar 27, 2023Updated 2 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,233Aug 7, 2025Updated 6 months ago
- Repository of yara rules☆4,722Apr 17, 2024Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago
- PowerShell Obfuscation Detection Framework☆750Dec 1, 2023Updated 2 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,136Oct 19, 2025Updated 4 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,897Feb 23, 2026Updated last week
- A toolset to make a system look as if it was the victim of an APT attack☆2,715Sep 23, 2025Updated 5 months ago
- APTnotes data☆1,773Dec 16, 2024Updated last year
- PowerShell script for deobfuscating encoded PowerShell scripts☆434Feb 4, 2021Updated 5 years ago
- Miscellaneous Malware RE☆193May 1, 2022Updated 3 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,295Feb 14, 2026Updated 2 weeks ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆387May 11, 2022Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- My musings with PowerShell☆2,704Nov 19, 2021Updated 4 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- PowerShell Obfuscator☆4,205Aug 10, 2023Updated 2 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,647Jan 1, 2024Updated 2 years ago