Hullgj / report-parserLinks
Cuckoo Sandbox report parser into ransomware classifier
☆11Updated 6 years ago
Alternatives and similar repositories for report-parser
Users that are interested in report-parser are comparing it to the libraries listed below
Sorting:
- 虚拟机带外内存监控☆14Updated 7 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- ☆21Updated last year
- ☆44Updated 5 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated last year
- ☆12Updated 5 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆44Updated 2 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- Recurrent neural networks in predicting security exploits☆21Updated 9 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 6 years ago
- 基于行为的Ransomware检测原型☆40Updated 8 years ago
- A minifilter driver for detecting and blocking ransomware virus☆27Updated 7 years ago
- My scripts to deobfuscate APT32 malware☆27Updated 3 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50Updated 6 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆41Updated 3 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated last year
- 这是一个基于 Cuckoo 开源版本的沙箱的修订版本, 该版本完全为了适配国内软件环境所打造☆77Updated 2 years ago
- Additional material for the malware variants identification paper☆10Updated 6 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated last year
- Anti-ransomware in linux, Decoy, Protect file, Protect drectory, Auto backup☆25Updated 2 years ago
- Explore Indicators of Compromise Automatically☆97Updated 5 years ago
- ☆18Updated 7 years ago
- A curated list of awesome malware analysis tools and resources☆44Updated 5 years ago
- ☆25Updated 5 years ago
- ☆12Updated 3 years ago
- ☆26Updated 2 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago