pandora
malware-ioc
pandora | malware-ioc | |
---|---|---|
3 | 8 | |
236 | 197 | |
1.7% | 1.0% | |
9.3 | 5.7 | |
9 days ago | 13 days ago | |
Python | Python | |
GNU Affero General Public License v3.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pandora
-
Pandora is an analysis framework to discover if a file is suspicious
It appears to hash the file locally, then look it up on a number of aggregators (or local scanner such as clamav), see: https://github.com/pandora-analysis/pandora/tree/main/pandor... for list.
You will need to be subscribed to those services that are not free and have API keys for each one.
- An analysis framework to discover if a file is suspicious with a simple UI
malware-ioc
- PTI-257 Group Indicators of Compromise (IOCs) - PTI-257 consists of former Wizard Spider actors who are publicly known for the various malware variants they use (Ryuk, Trickbot, and Conti, among others)
- Decryptor for PlutoCrypt Ransomware
- PTI-249 Group Indicators of Compromise (IOC)
- Vice Society Ransomware Indicators of Compromises (IOC)
- Lockbit Green Indicators of Compromises (IOCs)
- UNC1151 Group Indicators of Compromise (IOC) - a state sponsored actor targeting NATO countries
-
New intel (IoCs) on Conti ransomware group | Credits: prodaft
malware-ioc/Conti at master · prodaft/malware-ioc · GitHub
- Analysis of Brunhilda malware, a DAAS (Dropper as a Service) platform
What are some alternatives?
dagda - a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
Malware-Exhibit - 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
yaralyzer - Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.
IntelOwl - IntelOwl: manage your Threat Intelligence at scale
robin - RObust document image BINarization
Malware-Sample-Sources - Malware Sample Sources
pydoxtools - Effortlessly extract information from unstructured data with this library, utilizing advanced AI techniques. Compose AI in customizable pipelines and diverse sources for your projects.
kestrel-lang - Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.