Loading...

Telekom Security Malware Analysis Repository is a free tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Telekom Security Malware Analysis Repository, including their key features and shared capabilities.
File analysis & threat intel search engine for SOC and IR teams.
Shares 3 capabilities with Telekom Security Malware Analysis Repository: IOC, YARA, Cyber Threat Intelligence
Expands a single malware hash into full family visibility via structural analysis.
Shares 3 capabilities with Telekom Security Malware Analysis Repository: IOC, YARA, Cyber Threat Intelligence
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.
Shares 3 capabilities with Telekom Security Malware Analysis Repository: IOC, YARA, Cyber Threat Intelligence
Malware hunting platform that auto-generates YARA rules from shared code analysis.
Managed service with human analysts hunting threats across client networks.
Agentic AI threat hunting platform with real-time MITRE ATT&CK intelligence.
A collection of YARA rules for public use, built from intelligence profiles and file work.
Define and validate YARA rule metadata with CCCS YARA Specification.
Expands a single malware hash into full family visibility via structural analysis.
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.
Malware hunting platform that auto-generates YARA rules from shared code analysis.
Managed service with human analysts hunting threats across client networks.
A collection of YARA rules for public use, built from intelligence profiles and file work.
Define and validate YARA rule metadata with CCCS YARA Specification.
Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.
KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.
A project providing open-source YARA rules for malware and malicious file detection
A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.
A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
Repository for detection content with various types of rules and payloads.
A set of rules for detecting threats in various formats, including Snort, Yara, ClamAV, and HXIOC.
FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity
A collection of public YARA signatures for various malware families.
Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.
A multi-platform open source tool for triaging suspect systems and hunting for Indicators of Compromise (IOCs) across thousands of endpoints.
Managed threat hunting service detecting evasive threats in network environments
A managed security service that uses hypothesis-based threat hunting to proactively discover hidden threats, create new detection rules, and improve overall security posture.
Proactive threat hunting platform for detecting and investigating attacks
Proactive threat hunting platform for detecting adversary infrastructure
Community platform for sharing and creating detection rules with AI
AI-driven threat hunting platform for SOC alert triage and investigation
AI agent that autonomously validates threat hunt hypotheses across enterprise data
Threat hunting platform for credentials, phishing, malicious domains & leaks
Human-led threat hunting service for uncovering hidden adversaries
Managed threat hunting service combining ML analytics and human expertise
Virtual machine for secure, anonymous dark web investigation via Tor and I2P
Deep OSINT investigation tool for threat actor attribution and analysis
Managed threat hunting service with 24/7 expert hunters and AI-powered analysis
Proactive threat hunting service using threat intel and red team assessments
Real-time monitoring & automated response for blockchain/Web3 security threats
Threat detection marketplace with Sigma rules for SIEM and shift-left detection
Natural language threat hunting and investigation platform for SOC teams
AI-driven threat detection & hunting platform with MITRE ATT&CK analytics
Continuous threat hunting service based on TTP analysis and EDR exploitation
Covert proactive threat hunting platform with remote freeze & forensic analysis.
Managed threat hunting & correlation service with expert analysts.
Real-time threat hunting using behavioral analytics & Continuous Attack Graphs.
Threat hunting platform with free hunt packages and educational resources.
Proactive threat hunting service to find hidden attackers on client networks.
On-premise AI file repository with continuous malware analysis and retrohunting.
Common questions security professionals ask when evaluating alternatives and competitors to Telekom Security Malware Analysis Repository.
The most popular alternatives to Telekom Security Malware Analysis Repository include Stairwell, Stairwell Variant Discovery, Signature-Base, Cythereal MAGIC™, and PacketWatch Managed Threat Hunting. These Threat Hunting tools offer similar capabilities and are frequently compared by security professionals evaluating their options.