This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.
☆122Mar 4, 2026Updated last month
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- ☆35Updated this week
- ☆21Apr 19, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Collection of rules created using YARA-Signator over Malpedia☆143Jan 6, 2026Updated 3 months ago
- Repository of Yara Rules☆143Updated this week
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- ☆96Apr 8, 2026Updated 3 weeks ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Collection of private Yara rules.☆378Jan 28, 2026Updated 3 months ago
- ReversingLabs YARA Rules☆911Nov 3, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some YARA rules i will add from time to time☆68Mar 25, 2023Updated 3 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- ☆66Jan 27, 2023Updated 3 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆168Feb 11, 2025Updated last year
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Volatility plugin for extracts configuration data of known malware☆494Dec 22, 2023Updated 2 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆34Jan 1, 2023Updated 3 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆29Apr 22, 2023Updated 3 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆391May 11, 2022Updated 3 years ago
- A python library to parse OneNote (.one) files☆153Jul 11, 2024Updated last year
- Notes and IoCs of fresh malware☆63Jul 5, 2024Updated last year
- ☆391Updated this week
- Signatures and IoCs from public Volexity blog posts.☆366Dec 4, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Digital Forensics XML packages in Python☆18Jan 20, 2026Updated 3 months ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- function identification signatures☆12Apr 26, 2021Updated 5 years ago
- Emulator for Windows Malware Analysis☆15Feb 26, 2022Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago