This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.
☆121Mar 4, 2026Updated 2 weeks ago
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below
Sorting:
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- ☆34Updated this week
- ☆21Apr 19, 2024Updated last year
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Collection of rules created using YARA-Signator over Malpedia☆142Jan 6, 2026Updated 2 months ago
- Repository of Yara Rules☆141Updated this week
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- ☆96May 5, 2025Updated 10 months ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Collection of private Yara rules.☆379Jan 28, 2026Updated last month
- ReversingLabs YARA Rules☆900Nov 3, 2025Updated 4 months ago
- Some YARA rules i will add from time to time☆67Mar 25, 2023Updated 2 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- ☆66Jan 27, 2023Updated 3 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Dec 13, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Jan 1, 2023Updated 3 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- A python library to parse OneNote (.one) files☆143Jul 11, 2024Updated last year
- Notes and IoCs of fresh malware☆62Jul 5, 2024Updated last year
- ☆384Mar 14, 2026Updated last week
- Signatures and IoCs from public Volexity blog posts.☆366Dec 4, 2025Updated 3 months ago
- Digital Forensics XML packages in Python☆18Jan 20, 2026Updated 2 months ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Emulator for Windows Malware Analysis☆15Feb 26, 2022Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago