Quick analysis focusing on most important of a Malware or a Threat
☆38Sep 4, 2023Updated 2 years ago
Alternatives and similar repositories for Quick-Analysis
Users that are interested in Quick-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated last month
- Cyber threat intelligence tool suite.☆42Apr 3, 2025Updated 11 months ago
- ☆15Apr 8, 2023Updated 2 years ago
- ☆17Nov 13, 2024Updated last year
- Scripting together some of my favorite Python tools for doing initial triage of a suspected malicious document (e.g. PDF, DOC, DOCX, XSLM…☆17Mar 8, 2022Updated 4 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- ☆37Dec 27, 2021Updated 4 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- A Delphi symbol name recovery tool for reverse engineers.☆23Jan 17, 2026Updated 2 months ago
- ☆18Mar 26, 2024Updated last year
- Malquarium - Modern Malware Repository☆47Feb 11, 2026Updated last month
- A plugin for the commercial IDA Pro disassembler that warns users if they leave their instance idling for too long.☆31Feb 17, 2026Updated last month
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆80Mar 14, 2025Updated last year
- Tactics, Techniques, and Procedures☆28Jan 20, 2025Updated last year
- ☆18May 30, 2025Updated 9 months ago
- ☆15Jun 5, 2019Updated 6 years ago
- Register various user actions - keystrokes on the computer keyboard, movements and mouse keystrokes☆25Dec 26, 2024Updated last year
- ☆22Dec 22, 2020Updated 5 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Aug 17, 2018Updated 7 years ago
- @davidtwco's dotfiles - managed by chezmoi!☆14Jan 16, 2026Updated 2 months ago
- ☆15Sep 26, 2022Updated 3 years ago
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated last year
- ☆11May 28, 2020Updated 5 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated last week
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- IDA plugin for YARA signature creation☆19Nov 30, 2025Updated 3 months ago
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 5 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆38Jun 15, 2023Updated 2 years ago