TRISIS-TRITON-HATMAN
Malware repository
Repository containing malware samples and decompiled code to aid in security research and development of defense solutions
Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
233 stars
24 watching
84 forks
Language: Python
last commit: almost 4 years ago icsics-securitymalwarepythonscadascada-security
Related projects:
Repository | Description | Stars |
---|---|---|
| Customized Linux distribution geared towards ICS/SCADA pentesting professionals with integrated security tools | 106 |
| Automated malware collection and analysis system with storage, tracking, and visualization capabilities | 330 |
| A tool to collect intelligence about attackers targeting industrial control systems by simulating vulnerabilities in ICS networks | 1,258 |
| Provides an API wrapper for the Mitre ATT&CK framework | 26 |
| A centralized storage solution for malicious samples to support malware investigation and analysis | 217 |
| A collection of threat intelligence data, specifically malware indicators related to compromise events. | 221 |
| Automates OSINT analysis of IP addresses and hashes by querying multiple data sources | 535 |
| Automates extraction of code and configuration data from inaccessible Git, Mercurial, and Bazaar repositories by analyzing file names and object hashes. | 314 |
| Automated malware analysis system with a web interface and installer app | 1,075 |
| A framework for building flexible and lightweight malware analysis pipelines | 395 |
| A repository of malware indicators and rules for threat hunting and analysis. | 1,698 |
| An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
| An integration tool for Maltego to leverage MISP threat intelligence and the MITRE ATT&CK dataset | 171 |
| A collection of indicators of compromise from various investigations and blogs. | 79 |
| An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access | 189 |