☆40Jun 11, 2025Updated 9 months ago
Alternatives and similar repositories for ClarAVy
Users that are interested in ClarAVy are comparing it to the libraries listed below
Sorting:
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆30Mar 15, 2024Updated 2 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- ☆98Aug 22, 2025Updated 6 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Rust port of TLSH☆14Oct 12, 2025Updated 5 months ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆77Oct 8, 2025Updated 5 months ago
- Computational Memory Neural Network Compiler☆11Aug 11, 2021Updated 4 years ago
- ☆41Mar 9, 2026Updated last week
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Apr 24, 2023Updated 2 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- simple tracing utility for windows☆30Dec 9, 2025Updated 3 months ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆17Mar 14, 2025Updated last year
- ☆36Mar 6, 2026Updated 2 weeks ago
- This repository includes the codes and files related to the paper titled "An Unsupervised Learning Based Approach for Mining Attribute Ba…☆10Sep 16, 2021Updated 4 years ago
- Wazuh - Virtual Machines (OVA and AMI)☆17Mar 13, 2026Updated last week
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆73May 3, 2025Updated 10 months ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Dec 7, 2019Updated 6 years ago
- Malware Bypass Research using Reinforcement Learning☆107Apr 22, 2024Updated last year
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,137Nov 22, 2024Updated last year
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated 10 months ago
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- ☆14Jul 11, 2019Updated 6 years ago
- Command line tool for launching attacks against Machine Learning Malware detectors.☆19Jun 18, 2023Updated 2 years ago
- ☆164Oct 27, 2022Updated 3 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- A script to scan files with VirusTotal☆12Apr 16, 2024Updated last year
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- Implementation of the dilated self attention as described in "LongNet: Scaling Transformers to 1,000,000,000 Tokens"☆13Jul 23, 2023Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 5 months ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- A yara based MCP Server☆23Updated this week
- C++ implementation of ssdeep-compatible fast fuzzy hashing☆38Jun 28, 2017Updated 8 years ago
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆19Jul 25, 2025Updated 7 months ago
- ☆13Jul 6, 2023Updated 2 years ago