This directory contains random scripts from threat hunting or malware research
☆11Feb 15, 2018Updated 8 years ago
Alternatives and similar repositories for MalwareResearch
Users that are interested in MalwareResearch are comparing it to the libraries listed below
Sorting:
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- ☆17Jan 22, 2026Updated last month
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 5 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- ☆21May 19, 2016Updated 9 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Nov 11, 2022Updated 3 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- We, Achin and Harekrissna worked as a team to complete the project given to us on Buried threat detection using ground penetrating radar.…☆24Jan 28, 2020Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Jan 10, 2018Updated 8 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- ☆11Feb 9, 2023Updated 3 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Crane POAM Automation Tool (C-PAT™)☆15Feb 24, 2026Updated last week
- ☆10Aug 4, 2020Updated 5 years ago
- Detect-X Automated Threat Detection by AI☆32Oct 10, 2019Updated 6 years ago
- Code, commands, and chatter about Threat Hunting.☆35Jan 5, 2020Updated 6 years ago
- Sigma is Generic Signature Format for SIEM Systems written by Florian Roth @Neo23x0 and Thomas Patzke. This repository is providing sprea…☆33Oct 16, 2019Updated 6 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- This repo is where I store my Threat Hunting ideas/content☆88May 9, 2023Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- iOS malware samples☆43May 13, 2016Updated 9 years ago
- Scans for .NET Deserialization Bugs in .NET Assemblies☆81Nov 21, 2024Updated last year
- Advanced threat detection solution for Linux.☆36Dec 5, 2020Updated 5 years ago