Syntactic detection of malicious (obfuscated) JavaScript files
☆83Feb 1, 2020Updated 6 years ago
Alternatives and similar repositories for JaSt
Users that are interested in JaSt are comparing it to the libraries listed below
Sorting:
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆92Mar 1, 2023Updated 3 years ago
- JavaScript Transformation Techniques Detection☆11Jun 14, 2021Updated 4 years ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆28Feb 26, 2022Updated 4 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Collection of almost 40.000 javascript malware samples☆741Jul 23, 2024Updated last year
- Discovered Data and Source Code☆10May 5, 2025Updated 10 months ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- Simple example of using Django, the Bing search API, and google page rank.☆17Aug 11, 2012Updated 13 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- ☆33Oct 27, 2016Updated 9 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Flex 'em lexers☆42Oct 19, 2020Updated 5 years ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year
- ☆21Nov 7, 2023Updated 2 years ago
- It's a malware detection API for Windows malware utilizing Artificial Neural network.☆19Aug 2, 2024Updated last year
- Malicious PowerShell Dataset☆24Aug 8, 2023Updated 2 years ago
- Line counting and language identification tool☆18Apr 26, 2023Updated 2 years ago
- This project aims to detect if a pdf file is clean or malicious using Machine Leaning Techniques☆22Apr 15, 2022Updated 3 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆74Mar 31, 2021Updated 4 years ago
- Machine Learning for malicious Javascript code detection☆19Jan 13, 2017Updated 9 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago
- Packing detection tool for PE files☆27Dec 1, 2024Updated last year
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- 2015.11.12 三 个白帽一题的源码☆18Nov 12, 2015Updated 10 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Aug 22, 2018Updated 7 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- ☆31Aug 26, 2015Updated 10 years ago
- A Open Source XSS test platform powered by web.py <img/src=1 onerror=alert/:P/☆38Feb 15, 2014Updated 12 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆25Mar 14, 2017Updated 8 years ago
- ☆84Aug 7, 2013Updated 12 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38May 11, 2020Updated 5 years ago