☆44Sep 12, 2018Updated 7 years ago
Alternatives and similar repositories for CASC
Users that are interested in CASC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- Messing around with clamav sigs☆27Apr 15, 2026Updated 2 weeks ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- ☆99Jun 19, 2024Updated last year
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- because twin clams are better than one clam?☆29Apr 27, 2026Updated last week
- An Open Source Malware Analysis Pipeline System☆158Jun 1, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Vulnerable EDR☆25Nov 15, 2024Updated last year
- Public Github Pages for Cisco☆14Oct 16, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- A file system that mutates files☆14Jul 20, 2020Updated 5 years ago
- ssdeep for python on windows☆20Feb 7, 2026Updated 2 months ago
- Yara rules for malware families seen as part of targeted threats project☆142Nov 17, 2016Updated 9 years ago
- ☆49Jul 5, 2016Updated 9 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- ☆56Mar 2, 2026Updated 2 months ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆29Nov 10, 2016Updated 9 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- Malware analyses and helpful scripts☆30May 26, 2022Updated 3 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 15 years ago
- ☆15Sep 24, 2024Updated last year
- ☆16Mar 3, 2026Updated 2 months ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated last year
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆281Nov 3, 2019Updated 6 years ago
- Export disassemblies into Protocol Buffers☆21Jul 18, 2025Updated 9 months ago
- Are your installed packages _really_ the same as you saw on GitHub?☆24Jun 1, 2018Updated 7 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago