cccs-rs's repositories

apophis-YARA-Rules

Repository of yara rules and malware config extractors

Language:YARAStargazers:0Issues:0Issues:0
Language:PythonLicense:MITStargazers:0Issues:0Issues:0

assemblyline-services

Custom services for AssemblyLine 4

Language:HTMLLicense:MITStargazers:0Issues:0Issues:0

CAPE-parsers

CAPE core and community parsers

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

CAPE-TestFiles

Files that we use for unit testing

Stargazers:0Issues:0Issues:0

CAPEv2

Malware Configuration And Payload Extraction

Language:PythonLicense:NOASSERTIONStargazers:0Issues:1Issues:0

community

Community modules for CAPE Sandbox

Language:PythonStargazers:0Issues:0Issues:0

Configuration_extractors

Configuration Extractors for Malware

Language:PythonStargazers:0Issues:0Issues:0

DC3-MWCP

DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, filenames, and mutex names.

Language:PythonLicense:NOASSERTIONStargazers:0Issues:0Issues:0

helm-charts

You know, for Kubernetes

Language:PythonLicense:Apache-2.0Stargazers:0Issues:0Issues:0

plyara

Parse YARA rules and operate over them more easily.

Language:PythonLicense:Apache-2.0Stargazers:0Issues:0Issues:0

StealC-Yara-Config-Extractor

Configuration Extractor And Yara Rule For StealC

Language:PythonStargazers:0Issues:0Issues:0
Stargazers:0Issues:1Issues:0

TweetFeed

TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.

Stargazers:0Issues:0Issues:0
Language:PythonLicense:MITStargazers:0Issues:0Issues:0