☆38Jun 11, 2025Updated 8 months ago
Alternatives and similar repositories for ClarAVy
Users that are interested in ClarAVy are comparing it to the libraries listed below
Sorting:
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆30Mar 15, 2024Updated last year
- ☆94Aug 22, 2025Updated 6 months ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆76Oct 8, 2025Updated 4 months ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- ☆39Dec 31, 2025Updated last month
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- Python implementation of the LZJD algorithm☆32Jul 10, 2025Updated 7 months ago
- analysis of visual basic code☆47Mar 25, 2018Updated 7 years ago
- Quantum Optimal Control☆10Aug 25, 2025Updated 6 months ago
- Statistics from our binary transformation framework☆11Jan 16, 2025Updated last year
- An OpenAI-powered triage bot for a slack support channel designed to tag oncalls, prioritize issues, suggest solutions, and streamline co…☆12Jun 11, 2025Updated 8 months ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Simple Wordsearch Solving Python Script☆12Jul 8, 2018Updated 7 years ago
- ☆12May 30, 2019Updated 6 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 9 months ago
- ☆164Oct 27, 2022Updated 3 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Apr 24, 2023Updated 2 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,129Nov 22, 2024Updated last year
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆27Jan 30, 2026Updated 3 weeks ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Wazuh - Virtual Machines (OVA and AMI)☆16Feb 20, 2026Updated last week
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆18Jul 25, 2025Updated 7 months ago
- ☆11Jun 9, 2020Updated 5 years ago
- Unofficial mirror of libdatrie from http://linux.thai.net/svn/software/datrie/☆10Jul 20, 2016Updated 9 years ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated 2 weeks ago
- a viewer for for lancedb. including some actions like CRUD etc☆12Apr 27, 2025Updated 10 months ago
- The classic Snake game but in a shell environment.☆19Aug 14, 2025Updated 6 months ago
- Download a demo version of Open Network Insight, which can be run standalone on a windows laptop using Winpython https://sourceforge.net/…☆10Feb 1, 2017Updated 9 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- ☆11Oct 27, 2025Updated 4 months ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- A Python library for parsing, manipulating, and generating CybOX content.☆80May 1, 2020Updated 5 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated last year
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆13Jun 6, 2024Updated last year
- An example repository for @matklad's cargo xtask pattern☆10Aug 20, 2025Updated 6 months ago
- ☆15Mar 13, 2018Updated 7 years ago