Telsy CTI Research Team
☆57Dec 15, 2020Updated 5 years ago
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Apr 30, 2019Updated 7 years ago
- Miscellaneous Malware RE☆195May 1, 2022Updated 4 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 3 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆16Apr 30, 2024Updated 2 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Best practices in threat intelligence☆50Nov 6, 2022Updated 3 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆32Jan 28, 2020Updated 6 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Malware Configuration And Payload Extraction☆760Nov 22, 2024Updated last year
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hansel - a simple but flexible search for IDA☆26Jul 11, 2019Updated 6 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆172May 29, 2024Updated last year
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- ☆136Jan 24, 2019Updated 7 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- ☆42Sep 16, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Just a normal flask web app to understand win32api with code snippets and references.☆75Dec 8, 2019Updated 6 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- Official VirusTotal plugin for IDA Pro☆181Feb 4, 2026Updated 3 months ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Feb 7, 2019Updated 7 years ago
- This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map t…☆109Oct 30, 2019Updated 6 years ago
- YARA signature and IOC database for my scanners and tools☆2,949Updated this week
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆448Oct 26, 2022Updated 3 years ago
- Automated threat intelligence collection with McAfee ATD, OpenDXL and MISP☆22Feb 21, 2020Updated 6 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- APT34/OILRIG leak☆232Apr 17, 2019Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆165Sep 11, 2022Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Feb 15, 2019Updated 7 years ago
- Malware/IOC ingestion and processing engine☆110Nov 20, 2018Updated 7 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago