re-fox / documentationLinks
☆13Updated 5 years ago
Alternatives and similar repositories for documentation
Users that are interested in documentation are comparing it to the libraries listed below
Sorting:
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- ☆12Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Updated 4 years ago
- ☆11Updated 5 years ago
- ☆48Updated 5 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 5 years ago
- Plugins for the Viper Framework☆14Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Updated last year
- API functions for Malware Research☆35Updated 6 years ago
- ☆23Updated 6 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Updated 5 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Updated 4 years ago
- ☆23Updated 5 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- ☆22Updated 4 years ago
- Python 3 library to build YARA rules.☆13Updated 4 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- ☆36Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Yaras Random☆22Updated 6 years ago
- Handy scripts to speed up malware analysis☆35Updated 2 years ago