Hullgj / report-parser
Cuckoo Sandbox report parser into ransomware classifier
☆11Updated 6 years ago
Alternatives and similar repositories for report-parser:
Users that are interested in report-parser are comparing it to the libraries listed below
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆15Updated 2 years ago
- ssdeep cluster analysis for malware files☆30Updated 4 years ago
- ☆12Updated 2 years ago
- ☆21Updated last year
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 7 years ago
- 虚拟机带外内存监控☆14Updated 7 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 2 months ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 9 months ago
- Simple yara decompiler☆16Updated 8 years ago
- ☆12Updated 3 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(C发行版本)☆20Updated 5 years ago
- My scripts to deobfuscate APT32 malware☆26Updated 3 years ago
- ☆19Updated 9 years ago
- A minifilter driver for detecting and blocking ransomware virus☆26Updated 7 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆24Updated last year
- ☆24Updated 5 years ago
- ☆12Updated 4 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 5 months ago
- 威胁检测规则集☆15Updated 5 years ago
- ☆9Updated 7 years ago
- Additional material for the malware variants identification paper☆9Updated 5 years ago
- ssdeep for python on windows☆16Updated 7 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20Updated 5 years ago
- ☆12Updated 2 years ago
- All in one - Malware + Analysis by Cylance☆11Updated 6 years ago
- slides☆9Updated 3 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆36Updated 3 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago