☆44Sep 12, 2018Updated 7 years ago
Alternatives and similar repositories for CASC
Users that are interested in CASC are comparing it to the libraries listed below
Sorting:
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- ☆49Jul 5, 2016Updated 9 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- ☆99Jun 19, 2024Updated last year
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- ☆15Sep 24, 2024Updated last year
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- Public Github Pages for Cisco☆14Oct 16, 2018Updated 7 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- ☆16Updated this week
- ☆13Jun 13, 2017Updated 8 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Yara rules for malware families seen as part of targeted threats project☆141Nov 17, 2016Updated 9 years ago
- Oil Pumpjack: open source materials to create your own oil pumpjack managed by an Arduino☆35Feb 11, 2019Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- ssdeep for python on windows☆19Feb 7, 2026Updated 3 weeks ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- A file system that mutates files☆14Jul 20, 2020Updated 5 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 13 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago