pics by corkami

File formats dissections and more...

updated at Nov. 16, 2024, 2:30 p.m.

Assembly

364 +0

10,521 +3

734 -2

GitHub
awesome-threat-intelligence by hslatman

A curated list of Awesome Threat Intelligence resources

updated at Nov. 16, 2024, 1:08 p.m.

Unknown languages

563 +1

8,105 +29

1,486 -1

GitHub
javascript-malware-collection by HynekPetrak

Collection of almost 40.000 javascript malware samples

updated at Nov. 16, 2024, 11:49 a.m.

JavaScript

37 +0

682 +5

237 +0

GitHub
malSploitBase by misterch0c

Malware exploits

updated at Nov. 16, 2024, 11:48 a.m.

Python

56 +0

538 +1

197 +0

GitHub
awesome-industrial-control-system-security by hslatman

A curated list of resources related to Industrial Control System (ICS) security.

updated at Nov. 16, 2024, 8:24 a.m.

Python

137 +0

1,640 +8

436 +0

GitHub
malware-persistence by Karneades

Collection of malware persistence and hunting information. Be a persistent persistence hunter!

updated at Nov. 16, 2024, 8:10 a.m.

Unknown languages

8 +0

165 +1

15 +0

GitHub
awesome-infosec by onlurking

A curated list of awesome infosec courses and training resources.

updated at Nov. 16, 2024, 8 a.m.

Unknown languages

295 +0

5,205 +10

737 -1

GitHub
DC3-MWCP by Defense-Cyber-Crime-Center

DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, filenames, and mutex names.

updated at Nov. 16, 2024, 7:34 a.m.

Python

43 +0

300 +1

59 +0

GitHub
wdbgark by swwwolf

WinDBG Anti-RootKit Extension

updated at Nov. 16, 2024, 7:20 a.m.

C++

63 +0

615 +1

178 +0

GitHub
VolDiff by aim4r

VolDiff: Malware Memory Footprint Analysis based on Volatility

updated at Nov. 16, 2024, 7:18 a.m.

Python

28 +0

193 +1

50 +0

GitHub
orochi by LDO-CERT

The Volatility Collaborative GUI

updated at Nov. 16, 2024, 7:18 a.m.

JavaScript

11 +0

225 +2

19 +0

GitHub
inVtero.net by ShaneK2

inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques

updated at Nov. 16, 2024, 7:14 a.m.

C#

30 +0

279 +1

57 +0

GitHub
CapTipper by omriher

Malicious HTTP traffic explorer

updated at Nov. 16, 2024, 7:02 a.m.

Python

63 +0

711 +1

159 +0

GitHub
fibratus by rabbitstack

Adversary tradecraft detection, protection, and hunting

updated at Nov. 16, 2024, 6:59 a.m.

Go

70 +0

2,210 +0

190 +0

GitHub
PcapViz by mateuszk87

Visualize network topologies and collect graph statistics based on pcap files

updated at Nov. 16, 2024, 2:26 a.m.

Python

27 +0

342 +1

60 +0

GitHub
Loki by Neo23x0

Loki - Simple IOC and YARA Scanner

updated at Nov. 16, 2024, 2:16 a.m.

Python

184 +0

3,402 +7

583 +0

GitHub
binnavi by google

BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.

updated at Nov. 16, 2024, 1:38 a.m.

Java

220 +0

2,874 +2

453 +0

GitHub
bap by BinaryAnalysisPlatform

Binary Analysis Platform

updated at Nov. 16, 2024, 12:13 a.m.

OCaml

93 +0

2,068 +0

273 +0

GitHub
ngrep by jpr5

ngrep is like GNU grep applied to the network layer. It's a PCAP-based tool that allows you to specify an extended regular or hexadecimal expression to match against data payloads of packets. It understands many kinds of protocols, including IPv4/6, TCP, UDP, ICMPv4/6, IGMP and Raw, across a wide variety of interface types, and understands BPF filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.

updated at Nov. 15, 2024, 10:57 p.m.

C

23 +0

902 +2

101 +0

GitHub
rules by Yara-Rules

Repository of yara rules

updated at Nov. 15, 2024, 4:34 p.m.

YARA

351 +1

4,178 +7

1,008 +2

GitHub