BASS - BASS Automated Signature Synthesizer
☆179Sep 19, 2018Updated 7 years ago
Alternatives and similar repositories for BASS
Users that are interested in BASS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Automatically generate AV byte signatures from sets of similar binaries.☆288Dec 10, 2024Updated last year
- ☆44Sep 12, 2018Updated 7 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Jan 18, 2024Updated 2 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- ☆99Jun 19, 2024Updated last year
- ☆46Apr 6, 2017Updated 8 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- ☆32Jun 19, 2024Updated last year
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆114Mar 2, 2017Updated 9 years ago
- Collaborative malware analysis framework☆382Jan 22, 2019Updated 7 years ago
- Malware Configuration And Payload Extraction☆762Nov 22, 2024Updated last year
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,682Feb 14, 2024Updated 2 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,117Jul 10, 2024Updated last year
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- A static analyzer for PE executables.☆1,112Mar 11, 2026Updated last week
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆477Jun 16, 2023Updated 2 years ago
- Generating YARA rules based on binary code☆221Oct 7, 2021Updated 4 years ago
- Toolkit for enriching and speeding up static malware analysis☆169Jan 28, 2022Updated 4 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated last month
- yarGen is a generator for YARA rules☆1,781Jan 10, 2026Updated 2 months ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆390Sep 21, 2023Updated 2 years ago
- ☆55Sep 14, 2018Updated 7 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Dec 5, 2023Updated 2 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- A YARA-integrated process denial framework for Windows☆397Feb 15, 2020Updated 6 years ago
- Hansel - a simple but flexible search for IDA☆26Jul 11, 2019Updated 6 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆280Mar 1, 2023Updated 3 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,043Aug 23, 2021Updated 4 years ago