YarasigsVarious Yara signatures (possibly to be included in a release later).
Stars: ✭ 59 (-24.36%)
Awesome IocsA collection of sources of indicators of compromise.
Stars: ✭ 526 (+574.36%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-11.54%)
MultiscannerModular file scanning/analysis framework
Stars: ✭ 494 (+533.33%)
Operation WocaoOperation Wocao - Indicators of Compromise
Stars: ✭ 29 (-62.82%)
MalwaresourcecodeCollection of malware source code for a variety of platforms in an array of different programming languages.
Stars: ✭ 8,666 (+11010.26%)
DrebinDrebin - NDSS 2014 Re-implementation
Stars: ✭ 52 (-33.33%)
ApklabAndroid Reverse-Engineering Workbench for VS Code
Stars: ✭ 470 (+502.56%)
MystSecure Multiparty Key Generation, Signature and Decryption javacard applet
Stars: ✭ 21 (-73.08%)
Eth CryptoCryptographic javascript-functions for ethereum and tutorials to use them with web3js and solidity
Stars: ✭ 420 (+438.46%)
IocsIoC's, PCRE's, YARA's etc
Stars: ✭ 15 (-80.77%)
FclFCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (+424.36%)
YetiYour Everyday Threat Intelligence
Stars: ✭ 1,037 (+1229.49%)
StrelkaReal-time, container-based file scanning at enterprise scale
Stars: ✭ 387 (+396.15%)
Hazedumperup to date csgo offsets and hazedumper config
Stars: ✭ 860 (+1002.56%)
LookylooLookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
Stars: ✭ 381 (+388.46%)
Etl ParserEvent Trace Log file parser in pure Python
Stars: ✭ 66 (-15.38%)
ScatterwebextensionExtension that allows you to sign transactions with your private keys securely from within the browser without ever exposing them.
Stars: ✭ 359 (+360.26%)
Holmes TotemInvestigation Planner for fast running analysis with predictable execution time. For example, static analysis.
Stars: ✭ 25 (-67.95%)
RecuperabitA tool for forensic file system reconstruction.
Stars: ✭ 280 (+258.97%)
HistoricprocesstreeAn Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree view.
Stars: ✭ 46 (-41.03%)
Multi Party EcdsaRust implementation of {t,n}-threshold ECDSA (elliptic curve digital signature algorithm).
Stars: ✭ 339 (+334.62%)
Wechat Jssdk Signature微信JSSDK服务端生成签名认证,包含后端PHP与前端JS的实现,PHP后端有缓存access_token、jsapi_ticket。
Stars: ✭ 19 (-75.64%)
Ghidra scriptsScripts for the Ghidra software reverse engineering suite.
Stars: ✭ 732 (+838.46%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+3689.74%)
HamburglarHamburglar -- collect useful information from urls, directories, and files
Stars: ✭ 321 (+311.54%)
Multisignaturewallet311 byte EIP712 Signing Compliant Delegate-Call Enabled MultiSignature Wallet for the Ethereum Virtual Machine
Stars: ✭ 16 (-79.49%)
LolbasLiving Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 3,810 (+4784.62%)
MimirSmart OSINT collection of common IOC types
Stars: ✭ 63 (-19.23%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+1166.67%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+792.31%)
AttackdatamapA datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Stars: ✭ 264 (+238.46%)
MedusaBinary instrumentation framework based on FRIDA
Stars: ✭ 258 (+230.77%)
FlirtdbA community driven collection of IDA FLIRT signature files
Stars: ✭ 809 (+937.18%)
Freki🐺 Malware analysis platform
Stars: ✭ 285 (+265.38%)
ThreathuntingA Splunk app mapped to MITRE ATT&CK to guide your threat hunts
Stars: ✭ 738 (+846.15%)
YpdrawsignatureviewCapture signature view in Swift and export it as a vector graphics or bitmap
Stars: ✭ 279 (+257.69%)
RpotReal-time Packet Observation Tool
Stars: ✭ 38 (-51.28%)
DetectionlabelkDetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.
Stars: ✭ 273 (+250%)
ManalyzeA static analyzer for PE executables.
Stars: ✭ 701 (+798.72%)
MqueryYARA malware query accelerator (web frontend)
Stars: ✭ 264 (+238.46%)
Tweetnacl JsPort of TweetNaCl cryptographic library to JavaScript
Stars: ✭ 1,176 (+1407.69%)
KuiperDigital Forensics Investigation Platform
Stars: ✭ 257 (+229.49%)
UxmpdfkitAn iOS PDF viewer and annotator written in Swift that can be embedded into any application.
Stars: ✭ 260 (+233.33%)
Volatility BrowserhooksVolatility Framework plugin to detect various types of hooks as performed by banking Trojans
Stars: ✭ 36 (-53.85%)
Jose JwtUltimate Javascript Object Signing and Encryption (JOSE) and JSON Web Token (JWT) Implementation for .NET and .NET Core
Stars: ✭ 692 (+787.18%)
ThreatpinchlookupDocumentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (+229.49%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (+10.26%)
Uber Apk SignerA cli tool that helps signing and zip aligning single or multiple Android application packages (APKs) with either debug or provided release certificates. It supports v1, v2 and v3 Android signing scheme has an embedded debug keystore and auto verifies after signing.
Stars: ✭ 677 (+767.95%)
freki🐺 Malware analysis platform
Stars: ✭ 327 (+319.23%)
Owasp SeraphimdroidOWASP Seraphimdroid is an open source project with aim to create, as a community, an open platform for education and protection of Android users against privacy and security threats.
Stars: ✭ 62 (-20.51%)
yarasploitYaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
Stars: ✭ 31 (-60.26%)