☆715Oct 28, 2022Updated 3 years ago
Alternatives and similar repositories for public_tools
Users that are interested in public_tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators from Unit 42 Public Reports☆726Aug 17, 2025Updated 7 months ago
- ☆176Jun 25, 2024Updated last year
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 7 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,096Dec 9, 2025Updated 3 months ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆964Feb 28, 2026Updated 3 weeks ago
- Python Decoders for Common Remote Access Trojans☆1,117Jul 16, 2024Updated last year
- A VBA parser and emulation engine to analyze malicious macros.☆1,117Jul 10, 2024Updated last year
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated 2 weeks ago
- Indicators of Compromises (IOC) of our various investigations☆1,934Updated this week
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Kaspersky's GReAT KLara☆733Jul 24, 2024Updated last year
- yarGen is a generator for YARA rules☆1,781Jan 10, 2026Updated 2 months ago
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆263Mar 27, 2023Updated 2 years ago
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,240Aug 7, 2025Updated 7 months ago
- Repository of yara rules☆4,730Apr 17, 2024Updated last year
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- Interesting APT Report Collection And Some Special IOCs☆2,955Mar 17, 2026Updated last week
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,923Mar 17, 2026Updated last week
- PowerShell Obfuscation Detection Framework☆751Dec 1, 2023Updated 2 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆435Feb 4, 2021Updated 5 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Miscellaneous Malware RE☆193May 1, 2022Updated 3 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,141Oct 19, 2025Updated 5 months ago
- Windows Events Attack Samples☆2,526Jan 24, 2023Updated 3 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,722Sep 23, 2025Updated 6 months ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,300Feb 14, 2026Updated last month
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- APTnotes data☆1,777Dec 16, 2024Updated last year
- Various public documents, whitepapers and articles about APT campaigns☆3,643Jan 1, 2024Updated 2 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Aug 21, 2019Updated 6 years ago