vmware-samples / tau-researchLinks
The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security community, such as threat indicators of compromises (IoCs) and the corresponding scripts/tools TAU developed to extract the IoCs. The IoCs are typically used/discussed in TAU's published research papers such as repo…
☆17Updated 2 years ago
Alternatives and similar repositories for tau-research
Users that are interested in tau-research are comparing it to the libraries listed below
Sorting:
- ☆19Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- Malware Analysis tools☆26Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- LILO based Pulse Secure appliance disk image decryptor☆13Updated last year
- Symantec EDR Internals☆29Updated 4 years ago
- Script to chain search parameters for MalwareBazaar☆12Updated 10 months ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- ☆23Updated 2 years ago
- An Adaptive Misuse Detection System☆46Updated last year
- Lazarus analysis tools and research report☆57Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆35Updated last week
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆129Updated 3 years ago
- ☆18Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated 3 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Updated 3 months ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 10 months ago
- ☆46Updated last month
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆42Updated last year
- ☆27Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- Yara Rules for Modern Malware☆78Updated last year
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 3 years ago
- Volatility, on Docker 🐳☆40Updated last month
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- ☆68Updated 3 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆134Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆67Updated 2 years ago