Malware IocIndicators of Compromises (IOC) of our various investigations
Stars: ✭ 955 (+3083.33%)
yaraMalice Yara Plugin
Stars: ✭ 27 (-10%)
r2wikiRadare 2 wiki
Stars: ✭ 89 (+196.67%)
MultiscannerModular file scanning/analysis framework
Stars: ✭ 494 (+1546.67%)
freki🐺 Malware analysis platform
Stars: ✭ 327 (+990%)
Freki🐺 Malware analysis platform
Stars: ✭ 285 (+850%)
YargenyarGen is a generator for YARA rules
Stars: ✭ 795 (+2550%)
binlexA Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (+910%)
apooxmlGenerate YARA rules for OOXML documents.
Stars: ✭ 34 (+13.33%)
S1EMThis project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (+800%)
PecliCLI tool to analyze PE files
Stars: ✭ 46 (+53.33%)
ManalyzeA static analyzer for PE executables.
Stars: ✭ 701 (+2236.67%)
MqueryYARA malware query accelerator (web frontend)
Stars: ✭ 264 (+780%)
YobiYara Based Detection Engine for web browsers
Stars: ✭ 39 (+30%)
UrsadbTrigram database written in C++, suited for malware indexing
Stars: ✭ 72 (+140%)
Pepper An open source script to perform malware static analysis on Portable Executable
Stars: ✭ 250 (+733.33%)
libdemangleA simple library focusing on demangling symbols for different programing languages
Stars: ✭ 34 (+13.33%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+263.33%)
bluepillBluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (+213.33%)
ThreatPursuit-VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 1,033 (+3343.33%)
Batch-AntivirusBatch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (-13.33%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+2926.67%)
DGA-DetectionDGA Domain Detection using Bigram Frequency Analysis
Stars: ✭ 47 (+56.67%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (+50%)
Wireguard-DNScrypt-VPN-ServerFast setup wireguard server script, with dnscrypt and adblocking, maleware blocking, more blocking if you need. Use case eg. always on vpn and adblocking on ios or android, and be more secured in unknown networks.
Stars: ✭ 48 (+60%)
ConTroll Remote Access TrojanCreated a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (+130%)
vim-syntax-yaraA Vim syntax-highlighting file for YARA rules
Stars: ✭ 26 (-13.33%)
yara-forensicsSet of Yara rules for finding files using magics headers
Stars: ✭ 115 (+283.33%)
macOS-Security-UpdatesNotifies the user when macOS Security components like Gatekeeper and XProtect have been updated
Stars: ✭ 53 (+76.67%)
Defeat-Defender-V1.2Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+2850%)
yara-parserTools for parsing rulesets using the exact grammar as YARA. Written in Go.
Stars: ✭ 69 (+130%)
ghidra-r2webGhidra plugin to start an r2 webserver to let r2 interact with it
Stars: ✭ 38 (+26.67%)
cerberus researchResearch tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (+266.67%)
r2dumpbinA radare2 Python script to dump a raw IA32 binary to an NASM source file
Stars: ✭ 22 (-26.67%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (+890%)
matrixmirror of https://mypdns.org/my-privacy-dns/matrix as it is obviously no longer safe to do Girhub nor have we no longer any trust in them. See https://mypdns.org/my-privacy-dns/porn-records/-/issues/1347
Stars: ✭ 32 (+6.67%)
qt-ratRemote administration tool with Qt5
Stars: ✭ 37 (+23.33%)
maskedkitty🙀 Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files
Stars: ✭ 39 (+30%)
flashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (+290%)
Guanciale🥓 Grab info needed by Carbonara from executables and disassemblers databases
Stars: ✭ 14 (-53.33%)
showstopperShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
Stars: ✭ 132 (+340%)
threat-intelSignatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (+333.33%)
TS-453BeUbuntu on QNAP TS-453Be
Stars: ✭ 48 (+60%)
monetaMoneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (+1180%)
sarlaccSMTP server / sinkhole for collecting spam
Stars: ✭ 42 (+40%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+2153.33%)
ImHex-PatternsHex patterns, include patterns and magic files for the use with the ImHex Hex Editor
Stars: ✭ 192 (+540%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (+136.67%)
QuiescisQuescis is a powerful Remote Access Trojan for windows 💻 on C++
Stars: ✭ 56 (+86.67%)
ArminC-uBlock-Settings⚙️ ArminC's settings for uBlock₀ - remove most of the ads, pop-ups and trackers.
Stars: ✭ 24 (-20%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+916.67%)
vxVirus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.
Stars: ✭ 153 (+410%)
flashreTools to reverse the Toshiba FlashAir SD cards
Stars: ✭ 23 (-23.33%)