0xsha / florentinoLinks
Fast Static File Analysis Framework
☆104Updated 5 years ago
Alternatives and similar repositories for florentino
Users that are interested in florentino are comparing it to the libraries listed below
Sorting:
- rules to identify files containing juicy information like usernames, passwords etc☆129Updated 8 years ago
- Drupal Honeypot☆58Updated 6 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆162Updated 5 years ago
- Community-based integrated malware identification system☆81Updated 3 years ago
- Miscellaneous Malware RE☆195Updated 3 years ago
- CLI tool to analyze PE files☆90Updated last year
- A framework to generate unique test cases based on code snippets to test techniques☆54Updated 4 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆75Updated 6 years ago
- A malware analysis and classification tool.☆190Updated 4 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆112Updated 4 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- A YARA Rule Performance Measurement Tool☆61Updated last year
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- ☆54Updated 5 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 4 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆84Updated last year
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆128Updated 5 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 3 months ago
- ☆52Updated 7 years ago
- Various config files obtained during malware analysis☆67Updated 7 years ago
- ☆102Updated 6 years ago
- Lazy Office Analyzer☆121Updated 8 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- repository of tools & resources of the MMD team☆138Updated 3 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Updated 5 years ago
- Malware similarity platform with modularity in mind.☆80Updated 4 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆145Updated 5 years ago