Aurore54F / JaStLinks
Syntactic detection of malicious (obfuscated) JavaScript files
☆83Updated 5 years ago
Alternatives and similar repositories for JaSt
Users that are interested in JaSt are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆75Updated 5 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆92Updated 2 years ago
- PyPI malware packages☆59Updated 7 years ago
- IoT Security Reading List☆62Updated 5 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz)☆93Updated 8 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- An Automated Vulnerability Detection System☆59Updated 9 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 3 years ago
- Scan pypi for typosquatting☆38Updated 3 years ago
- NVD/CVE as JSON files☆124Updated this week
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Updated last year
- Python wrapper for the API of cve-search☆127Updated 2 years ago
- ☆30Updated 4 years ago
- CPE: Common Platform Enumeration for Python☆97Updated 4 months ago
- The Tangled Genealogy of IoT Malware☆12Updated 5 years ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆73Updated 4 years ago
- Protocol Learning and Stateful Fuzzing☆355Updated 3 years ago
- ReDeBug Source Code.☆24Updated 2 years ago
- ☆14Updated 8 years ago
- A collection of known Domain Generation Algorithms☆67Updated 9 years ago
- A Libemu Cython wrapper☆128Updated 2 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Updated 10 years ago
- The FTP fuzzer for Sulley and Peach.☆53Updated 12 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆180Updated last year
- Protocol Inspection and State Machine Analysis☆23Updated 7 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆67Updated 4 years ago