Ukraine-Cyber-Operations
awesome-malware-analysis
Ukraine-Cyber-Operations | awesome-malware-analysis | |
---|---|---|
10 | 8 | |
907 | 11,071 | |
-0.1% | - | |
3.4 | 0.0 | |
10 months ago | 11 days ago | |
YARA | ||
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Ukraine-Cyber-Operations
- GitHub - curated-intel/Ukraine-Cyber-Operations: Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
- Ukraine-Cyber-Operations: Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence.
- GitHub - Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
- Russia-Ukraine Cyberwar 2022
- Ukraine curated cyber intel
- Ukraine Cyber Operations: Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence.
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. (github/curated-intel)
- Collection of Ukraine related OSINT
awesome-malware-analysis
- Windows found a trojan called "ravadon.e". Is this a false alarm or what? I can't find anything about it offline except a site that just copy and pastes the trojan name into it's text.
-
Cybersecurity Repositories
Malware Analysis
-
Understanding cuckoo sandbox json report
The JSON simply contains a summary of artefacts and behavior indicators that had been recorded while your malware sample detonated. Don't get me wrong - but you maybe want to take a step back and check out some of the basics. This page provides a ton of resources for any skill level: https://github.com/rshipp/awesome-malware-analysis
-
Is clamav still regarded as the best virus scanning software on Linux?
https://github.com/rshipp/awesome-malware-analysis *
-
awesome-malware-analysis VS awesome-executable-packing - a user suggested alternative
2 projects | 15 Dec 2021
- Recommended ways to learn malware field of information security? comprehensive guide? not just how to start for a beginner? (although I'm a beginner)
-
The Hitchhiker’s Guide to Online Anonymity (new draft version v0.7.8)
Added reference to https://github.com/rshipp/awesome-malware-analysis in the Malware analysis appendix
-
Malware Sample for beginners
Collection of Tools and Resources - https://github.com/rshipp/awesome-malware-analysis
What are some alternatives?
StandWithUkraine - #StandWithUkraine banner and related documents
awesome-frida - Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)
C2IntelFeeds - Automatically created C2 Feeds
malware-samples - A collection of malware samples caught by several honeypots i manage
MISP - MISP (core software) - Open Source Threat Intelligence and Sharing Platform
spiderfoot - SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
theZoo - A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Cerebro - Scripts and lists to help generate YARA friendly string mutations
awesome-yara - A curated list of awesome YARA rules, tools, and people.
ThreatIngestor - Extract and aggregate threat intelligence.
HiddenVM - HiddenVM — Use any desktop OS without leaving a trace.