Category: Malware Analysis

PEpper

PEpper: perform malware static analysis on Portable Executable

PEpper An open source tool to perform malware static analysis on Portable Executable. Feature extracted Suspicious entropy ratio Suspicious name ratio Suspicious code size Suspicious debugging time-stamp Number of export Number of anti-debugging calls Number of virtual-machine detection calls Number of suspicious API calls Number...

Remote Threat Hunting Incident Response

Cyber Threat Intelligence

Cyber Threat Intelligence (cti) The Cyber Threat Intelligence Repository of ATT&CK and CAPEC catalogs expressed in STIX 2.0 JSON.   ATT&CK ATT&CK is a catalog of techniques and tactics that describe post-compromise adversary behavior...

Icewater: 16,432 Free Yara rules

Icewater Yara rules This project provides open-source YARA rules for the detection of malware and malicious files. The anti-virus industry prefers names for a threat. This is my attempt to publish signatures as numbers. Since...