This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.
☆118Dec 13, 2023Updated 2 years ago
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below
Sorting:
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Some YARA rules i will add from time to time☆67Mar 25, 2023Updated 2 years ago
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Collection of rules created using YARA-Signator over Malpedia☆141Jan 6, 2026Updated last month
- ☆33Updated this week
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Repository of Yara Rules☆139Feb 16, 2026Updated last week
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- ☆96May 5, 2025Updated 9 months ago
- ☆66Jan 27, 2023Updated 3 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- ReversingLabs YARA Rules☆898Nov 3, 2025Updated 3 months ago
- Signatures and IoCs from public Volexity blog posts.☆363Dec 4, 2025Updated 2 months ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Dec 13, 2022Updated 3 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 3 years ago
- God Mode Detection Rules☆133Aug 8, 2024Updated last year
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Jan 1, 2023Updated 3 years ago
- A python library to parse OneNote (.one) files☆142Jul 11, 2024Updated last year
- Collection of private Yara rules.☆378Jan 28, 2026Updated last month
- ☆18Mar 26, 2024Updated last year
- ☆21Apr 19, 2024Updated last year
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated last year
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- Notes and IoCs of fresh malware☆62Jul 5, 2024Updated last year
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Repository of YARA rules made by Trellix ATR Team☆625Mar 18, 2025Updated 11 months ago
- ☆12Jun 29, 2021Updated 4 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago