AnyMaster / pehashng
revised "peHash: A Novel Approach to Fast Malware Clustering"
☆21Updated 8 years ago
Alternatives and similar repositories for pehashng:
Users that are interested in pehashng are comparing it to the libraries listed below
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆36Updated 8 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- Volatility Plugins☆21Updated 9 years ago
- Tools☆13Updated last year
- Automatically exported from code.google.com/p/verify-sigs☆18Updated 8 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 9 years ago
- Extract GUIDs from .NET assemblies☆21Updated 8 years ago
- Malware.lu configuration extractor☆24Updated 10 years ago
- Useful scripts, rules etc. for use with YARA☆27Updated 3 years ago
- Automation for VirusTotal☆31Updated 8 years ago
- ☆19Updated 6 years ago
- Python libary to normalize Yara signatures☆19Updated 4 years ago
- Binarly SDK v1☆13Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- openioc_scan Volatility Framework plugin☆42Updated 8 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19Updated 9 years ago
- a collection of public yara rules☆26Updated 5 years ago
- VirusTotal Intelligence Notification Puller☆28Updated 8 years ago
- A collection of Yara rules I have created so far☆16Updated 4 years ago
- ☆16Updated 9 years ago
- ripPE - section extractor and profiler for PE file analysis☆32Updated 10 years ago
- A Volatility plugin for finding sqlite database rows☆22Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Network detector for Winnti malware☆20Updated 6 years ago
- Modified edition of cuckoo community modules☆32Updated 5 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 9 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 5 years ago