Avira / virexLinks
☆13Updated 5 years ago
Alternatives and similar repositories for virex
Users that are interested in virex are comparing it to the libraries listed below
Sorting:
- VirusTotal tools☆91Updated 4 years ago
- Public Profile Repository for Rekall Memory Forensic.☆100Updated 4 years ago
- Repository for various tools around security☆42Updated 10 months ago
- Yara rules for malware families seen as part of targeted threats project☆138Updated 8 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- Malware static analysis framework☆177Updated 5 years ago
- ☆64Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- Rekall is an endpoint security solution.☆39Updated 7 years ago
- general purpose and malware specific analysis tools☆102Updated 9 years ago
- ☆36Updated 4 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆77Updated 7 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- Mobile Incident Response Book☆61Updated 9 years ago
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆21Updated last year
- ☆36Updated 8 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Updated 8 years ago
- CVE Project Documentation☆82Updated this week
- POLAR☆73Updated 6 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Updated 8 years ago
- A warehouse for your malware☆134Updated 12 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- Canonical source for Mozilla Foundation Security Advisories. http://www.mozilla.org/security/announce/☆21Updated last week
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Dragon Sandbox☆78Updated 12 years ago
- ☆68Updated 7 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆34Updated 9 years ago