vmware-samples / tau-researchLinks
The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security community, such as threat indicators of compromises (IoCs) and the corresponding scripts/tools TAU developed to extract the IoCs. The IoCs are typically used/discussed in TAU's published research papers such as repo…
☆17Updated 2 years ago
Alternatives and similar repositories for tau-research
Users that are interested in tau-research are comparing it to the libraries listed below
Sorting:
- ☆20Updated last year
- An Adaptive Misuse Detection System☆46Updated last year
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆133Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- shared samples from #dailyphish and/or #apt tweets☆41Updated 4 months ago
- ☆23Updated 2 years ago
- Lazarus analysis tools and research report☆57Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- Volatility, on Docker 🐳☆41Updated 2 months ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 3 years ago
- LILO based Pulse Secure appliance disk image decryptor☆13Updated last year
- Yara Rules for Modern Malware☆78Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆133Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- Active C2 IoCs☆99Updated 3 years ago
- Source code used at TweetFeed.live☆48Updated 3 years ago
- Repository of Yara rules created by the Stratosphere team☆29Updated 4 years ago
- Some of my Malware Analysis writeups☆49Updated 3 months ago
- Windows symbol tables for Volatility 3☆92Updated last year
- This is a repository that is meant to hold detections for various process injection techniques.☆34Updated 5 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 11 months ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆144Updated this week
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 8 months ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Updated 7 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago