This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.
☆121Mar 4, 2026Updated last month
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- ☆35Updated this week
- ☆21Apr 19, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Collection of rules created using YARA-Signator over Malpedia☆143Jan 6, 2026Updated 3 months ago
- Repository of Yara Rules☆141Mar 16, 2026Updated 3 weeks ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- ☆96May 5, 2025Updated 11 months ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Collection of private Yara rules.☆379Jan 28, 2026Updated 2 months ago
- ReversingLabs YARA Rules☆900Nov 3, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Some YARA rules i will add from time to time☆67Mar 25, 2023Updated 3 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- ☆66Jan 27, 2023Updated 3 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Jan 1, 2023Updated 3 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆29Apr 22, 2023Updated 2 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- A python library to parse OneNote (.one) files☆146Jul 11, 2024Updated last year
- Notes and IoCs of fresh malware☆63Jul 5, 2024Updated last year
- ☆385Updated this week
- Signatures and IoCs from public Volexity blog posts.☆366Dec 4, 2025Updated 4 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Digital Forensics XML packages in Python☆18Jan 20, 2026Updated 2 months ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Emulator for Windows Malware Analysis☆15Feb 26, 2022Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago