Aurore54F / JaStView external linksLinks
Syntactic detection of malicious (obfuscated) JavaScript files
☆83Feb 1, 2020Updated 6 years ago
Alternatives and similar repositories for JaSt
Users that are interested in JaSt are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆75Jan 18, 2021Updated 5 years ago
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆16Nov 10, 2019Updated 6 years ago
- JavaScript Transformation Techniques Detection☆11Jun 14, 2021Updated 4 years ago
- ☆30Nov 29, 2021Updated 4 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Mar 30, 2020Updated 5 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Simple example of using Django, the Bing search API, and google page rank.☆17Aug 11, 2012Updated 13 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- ☆16Oct 2, 2024Updated last year
- ☆33Oct 27, 2016Updated 9 years ago
- Malicious PowerShell Dataset☆22Aug 8, 2023Updated 2 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Flex 'em lexers☆42Oct 19, 2020Updated 5 years ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year
- ☆21Nov 7, 2023Updated 2 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated last month
- It's a malware detection API for Windows malware utilizing Artificial Neural network.☆19Aug 2, 2024Updated last year
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆72Mar 31, 2021Updated 4 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆47Jan 25, 2022Updated 4 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- Simple SSH brute-forcer written in Go☆23May 29, 2016Updated 9 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- ☆31Aug 26, 2015Updated 10 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 7 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆25Mar 14, 2017Updated 8 years ago
- ☆84Aug 7, 2013Updated 12 years ago
- ☆31May 1, 2025Updated 9 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- ☆20Oct 22, 2019Updated 6 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago