Quick analysis focusing on most important of a Malware or a Threat
☆38Sep 4, 2023Updated 2 years ago
Alternatives and similar repositories for Quick-Analysis
Users that are interested in Quick-Analysis are comparing it to the libraries listed below
Sorting:
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Scripting together some of my favorite Python tools for doing initial triage of a suspected malicious document (e.g. PDF, DOC, DOCX, XSLM…☆17Mar 8, 2022Updated 3 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated 2 weeks ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- ☆17Nov 13, 2024Updated last year
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- Solarized Theme for IDA Pro 7.3 and above☆15Nov 28, 2024Updated last year
- ☆15Jun 5, 2019Updated 6 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- ☆15Apr 8, 2023Updated 2 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Cyber threat intelligence tool suite.☆42Apr 3, 2025Updated 11 months ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Aug 17, 2018Updated 7 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- ☆37Dec 27, 2021Updated 4 years ago
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- FUD Linux Ransomware☆14Jan 12, 2023Updated 3 years ago
- FUD Linux Remote Access Trojan☆18Nov 18, 2022Updated 3 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Public open-source code of malware NetTraveler (aka TravNet).☆37May 28, 2015Updated 10 years ago
- Tactics, Techniques, and Procedures☆27Jan 20, 2025Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 3 years ago
- Reads and prints information from the website MalAPI.io☆19Jul 14, 2022Updated 3 years ago
- My IDA Python scripts.☆22May 31, 2022Updated 3 years ago
- ☆23Jun 29, 2017Updated 8 years ago
- Malquarium - Modern Malware Repository☆47Feb 11, 2026Updated 3 weeks ago
- ☆25Mar 19, 2025Updated 11 months ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Jul 27, 2016Updated 9 years ago
- ☆25May 19, 2022Updated 3 years ago
- Commandline utility to interact with the Malpedia service☆22Dec 5, 2025Updated 2 months ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆80Mar 14, 2025Updated 11 months ago
- Some YARA rules i will add from time to time☆67Mar 25, 2023Updated 2 years ago
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 7 months ago