0xsha / florentinoLinks
Fast Static File Analysis Framework
☆104Updated 5 years ago
Alternatives and similar repositories for florentino
Users that are interested in florentino are comparing it to the libraries listed below
Sorting:
- CLI tool to analyze PE files☆88Updated last year
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- A malware analysis and classification tool.☆190Updated 3 years ago
- repository of tools & resources of the MMD team☆134Updated 3 years ago
- Miscellaneous Malware RE☆196Updated 3 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated last year
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆55Updated 4 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆74Updated 5 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆162Updated 5 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- ☆52Updated 7 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆126Updated 5 years ago
- ☆135Updated 6 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Drupal Honeypot☆57Updated 6 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆103Updated 4 years ago
- VSCode extension for the YARA pattern matching language☆64Updated last year
- Tools for parsing rulesets using the exact grammar as YARA. Written in Go.☆85Updated 2 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆144Updated 5 years ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- XOR Key Extractor☆50Updated last year
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Lazy Office Analyzer☆122Updated 8 years ago