0xsha / florentinoLinks
Fast Static File Analysis Framework
☆104Updated 5 years ago
Alternatives and similar repositories for florentino
Users that are interested in florentino are comparing it to the libraries listed below
Sorting:
- Use Markov Chains to obfuscate data as other data☆55Updated 9 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- A malware analysis and classification tool.☆190Updated 4 years ago
- Drupal Honeypot☆58Updated 6 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆75Updated 6 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆83Updated last year
- Community-based integrated malware identification system☆81Updated 3 years ago
- CLI tool to analyze PE files☆90Updated last year
- repository of tools & resources of the MMD team☆137Updated 3 years ago
- Miscellaneous Malware RE☆196Updated 3 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- ☆48Updated 5 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54Updated 4 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆162Updated 5 years ago
- ☆102Updated 6 years ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- ☆136Updated 6 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆126Updated 5 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆144Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago