☆44Sep 12, 2018Updated 7 years ago
Alternatives and similar repositories for CASC
Users that are interested in CASC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- ☆99Jun 19, 2024Updated last year
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- because twin clams are better than one clam?☆29Jan 30, 2026Updated last month
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Vulnerable EDR☆24Nov 15, 2024Updated last year
- Public Github Pages for Cisco☆14Oct 16, 2018Updated 7 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- A file system that mutates files☆14Jul 20, 2020Updated 5 years ago
- ssdeep for python on windows☆19Feb 7, 2026Updated last month
- Yara rules for malware families seen as part of targeted threats project☆141Nov 17, 2016Updated 9 years ago
- ☆49Jul 5, 2016Updated 9 years ago
- ☆55Mar 2, 2026Updated 3 weeks ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- ☆16Mar 3, 2026Updated 2 weeks ago
- ☆15Sep 24, 2024Updated last year
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆281Nov 3, 2019Updated 6 years ago
- Are your installed packages _really_ the same as you saw on GitHub?☆24Jun 1, 2018Updated 7 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago