Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-1.43%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+12.86%)
Freki🐺 Malware analysis platform
Stars: ✭ 285 (+307.14%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+1690%)
freki🐺 Malware analysis platform
Stars: ✭ 327 (+367.14%)
Detect It EasyProgram for determining types of files for Windows, Linux and MacOS.
Stars: ✭ 2,982 (+4160%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-14.29%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+2684.29%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-12.86%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-68.57%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+127.14%)
OsweepDon't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+221.43%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-14.29%)
MalwareHashDBMalware hashes for open source projects.
Stars: ✭ 31 (-55.71%)
WinappdbgWinAppDbg Debugger
Stars: ✭ 338 (+382.86%)
Threat HuntingPersonal compilation of APT malware from whitepaper releases, documents and own research
Stars: ✭ 219 (+212.86%)
FameFAME Automates Malware Evaluation
Stars: ✭ 663 (+847.14%)
BesafeBeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-70%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+9731.43%)
fame modulesCommunity modules for FAME
Stars: ✭ 55 (-21.43%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-74.29%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (+81.43%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (+75.71%)
FileintelA modular Python application to pull intelligence about malicious files
Stars: ✭ 97 (+38.57%)
Mwdb CoreMalware repository component for samples & static configuration with REST API interface.
Stars: ✭ 125 (+78.57%)
Visualize logsA Python library and command line tools to provide interactive log visualization.
Stars: ✭ 128 (+82.86%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+4878.57%)
rair-coreRAIR: RAdare In Rust
Stars: ✭ 63 (-10%)
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (+54.29%)
Blue-Team-NotesYou didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+1184.29%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+1311.43%)
KartonDistributed malware processing framework based on Python, Redis and MinIO.
Stars: ✭ 134 (+91.43%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+301.43%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-51.43%)
aparoidStatic and dynamic Android application security analysis
Stars: ✭ 62 (-11.43%)
cheatsheetThese are some of the commands which I use frequently during Malware Analysis and DFIR.
Stars: ✭ 23 (-67.14%)
qvm-create-windows-qubeSpin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+281.43%)
bonomenBONOMEN - Hunt for Malware Critical Process Impersonation
Stars: ✭ 42 (-40%)
assemblylineAssemblyLine 4 - File triage and malware analysis
Stars: ✭ 69 (-1.43%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-72.86%)
WeDefend⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan
Stars: ✭ 23 (-67.14%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+865.71%)
tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-48.57%)
dummyDLLUtility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-50%)
BEFA-LibraryHigh-level library for executable binary file analysis
Stars: ✭ 14 (-80%)
toolkitThe essential toolkit for reversing, malware analysis, and cracking
Stars: ✭ 176 (+151.43%)
bluepillBluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (+34.29%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+322.86%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-52.86%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+55.71%)