Distributed malware processing framework based on Python, Redis and S3.
☆461Dec 1, 2025Updated 3 months ago
Alternatives and similar repositories for karton
Users that are interested in karton are comparing it to the libraries listed below
Sorting:
- Malware repository component for samples & static configuration with REST API interface.☆376Feb 24, 2026Updated last week
- Malduck is your ducky companion in malware analysis journeys☆349Jun 22, 2025Updated 8 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,269Updated this week
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58May 24, 2021Updated 4 years ago
- ☆21Jan 17, 2025Updated last year
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆785Feb 22, 2026Updated last week
- ☆16Apr 30, 2024Updated last year
- Malware Configuration And Payload Extraction☆3,031Updated this week
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- ReversingLabs YARA Rules☆898Nov 3, 2025Updated 4 months ago
- DRAKVUF Black-box Binary Analysis☆1,209Updated this week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,844Updated this week
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated last month
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆799Sep 13, 2025Updated 5 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆694Feb 26, 2026Updated last week
- Windows kernel and user mode emulation.☆1,860Updated this week
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆96Jan 13, 2026Updated last month
- Cockroach is your primitive & immortal swiss army knife.☆48Dec 8, 2021Updated 4 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆340Feb 7, 2025Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- A guide on how to write fast and memory friendly YARA rules☆166Feb 11, 2025Updated last year
- Your Everyday Threat Intelligence☆1,954Feb 12, 2026Updated 3 weeks ago
- A Binary Genetic Traits Lexer Framework☆523Updated this week
- ☆98Oct 7, 2020Updated 5 years ago
- High Octane Triage Analysis☆820Updated this week
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆803Feb 5, 2026Updated 3 weeks ago
- Repository of YARA rules made by Trellix ATR Team☆625Mar 18, 2025Updated 11 months ago
- Real-time, container-based file scanning at enterprise scale☆975Feb 25, 2026Updated last week
- Binee: binary emulation environment☆530Feb 25, 2023Updated 3 years ago
- A machine learning tool that ranks strings based on their relevance for malware analysis.☆752Jan 22, 2026Updated last month
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Nov 25, 2023Updated 2 years ago
- Automated handling of data feeds for security teams☆147Dec 31, 2025Updated 2 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago