Dump and parse embedded certificates from Windows binaries
☆11Jan 3, 2012Updated 14 years ago
Alternatives and similar repositories for pe32-cert-dump
Users that are interested in pe32-cert-dump are comparing it to the libraries listed below
Sorting:
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 11 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- A program to sign an arbitrary file with your Logbook of the World key and verify such signatures.☆18Dec 29, 2025Updated 2 months ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Malware.lu tools☆63Oct 28, 2013Updated 12 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- ☆50Apr 10, 2016Updated 9 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Public version of PDF X-RAY☆59Apr 9, 2012Updated 13 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Ida Pro Ultimate Qt Build Guide☆27Dec 13, 2018Updated 7 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated last month
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- Python API for URL Query☆36May 22, 2016Updated 9 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago
- Dynamic malware analysis for the Android platform☆40Sep 26, 2014Updated 11 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Aug 8, 2014Updated 11 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Feb 17, 2015Updated 11 years ago
- Whole house water leak detection and water shutoff system. Requires a supervisory computer for full functionality. Communications is via…☆10Mar 16, 2025Updated 11 months ago
- Ipsumdump and other programs for command-line network trace manipulation.☆40Feb 16, 2024Updated 2 years ago
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- Automated malware unpacker☆121Mar 5, 2016Updated 9 years ago
- Simple detector of ARP poisoning attack☆29Apr 23, 2015Updated 10 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- PE Import Hash Generator☆79Jul 17, 2017Updated 8 years ago