A curated list of awesome malware analysis tools and resources.
-
Updated
Nov 5, 2019 - 622 commits
A curated list of awesome malware analysis tools and resources.
SpiderFoot, the most complete OSINT collection and reconnaissance tool.
Domain name permutation engine for detecting typo squatting, phishing and corporate espionage
Sysmon configuration file template with default high-quality event tracing
Phishing catcher using Certstream
Package uwsgi from Ubuntu repo is advised in production usage, but it is too old and won't work. File yeti_uwsgi.service has -w switch which is absent in this package.
Pip version works, probably it's sufficient to add uwsgi to requirements.txt
| Question | Answer |
|---|---|
| OS version | Ubuntu 16.04 LTS |
The Correlated CVE Vulnerability And Threat Intelligence Database API
proxycheck.io is very convenient service for detecting proxies with sane updated database. it has some interesting fields in its responses (see below)
without API key everyone gets 100 queries per day:
curl -s 'http://proxycheck.io/v2/37.60.48.2?risk=1&vpn=1&seen=1&port=1' | jq
{
"status": "ok",
"37.60.48.2": {
"proxy": "yes",
"type": "VPAdvanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing
Powerful plugins and add-ons for hackers
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Defanged Indicator of Compromise (IOC) Extractor.
Extract and aggregate threat intelligence.
Intelligence and Reconnaissance Package/Bundle installer.
Threat Feed Aggregation, Made Easy
CIF v3 -- the fastest way to consume threat intelligence
Multithreaded threat Intelligence gathering built with Python3
As most of us will be sitting behind a firewall, it would be useful to know the IPs/Host names and ports this plugin uses so we can open up our firewalls for only what is required.
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Domain name permutation engine written in Go
MISP trainings, threat intel and information sharing training materials with source code
A dashboard for a real-time overview of threat intelligence from MISP instances
OSINT Threat Intel Interface - CLI for HoneyDB
internet monitoring osint tool for windows
Add the ability for using certificate-based authentication for the taxii-proxy command.
Hello everyone!
I have a few doubts on how events are handled across misp instances and Orgs. As I still haven't complete domain of the code and my curiosity is killing me, I'm coming here to ask help =]
Wil