Stars
Production-ready detection & response queries for osquery
Real-time, container-based file scanning at enterprise scale
get things from one computer to another, safely
An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
Suricata rules for network anomaly detection
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
Tracking interesting Linux (and UNIX) malware. Send PRs
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
A centralized and enhanced memory analysis platform
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
A VBA parser and emulation engine to analyze malicious macros.
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…
YARA malware query accelerator (web frontend)
Transparent SSL/TLS proxy for decrypting and diverting network traffic to other programs, such as UTM services, for deep SSL inspection
TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and gather useful channel information easily.
Java decompiler, assembler, and disassembler
Set of tools to analyze Windows sandboxes for exposed attack surface.
This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …