MacDue / ssdeep-windows-32_64
ssdeep for python on windows
☆16Updated 7 years ago
Alternatives and similar repositories for ssdeep-windows-32_64
Users that are interested in ssdeep-windows-32_64 are comparing it to the libraries listed below
Sorting:
- ssdeep cluster analysis for malware files☆30Updated 4 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆10Updated 4 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Updated 2 years ago
- Utilities for working with vivisect☆25Updated 2 months ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 3 months ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- Here is python script I wrote for deobfuscation APT32 sample.☆10Updated 3 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Static configuration extractor for the Karton framework☆10Updated 4 months ago
- A set of small utilities, helpers for PIN tracers☆33Updated last year
- Currently proof-of-concept☆16Updated 3 years ago
- A benign application used to demonstrate an EDR detection. This version is procedural (i.e., not object-oriented).☆1Updated 2 years ago
- ☆28Updated 5 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆57Updated 3 years ago
- Python interface for Binexport, the Bindiff export format☆16Updated this week
- Repository of vulnerabilities disclosed by ESET☆28Updated 2 years ago
- Parallel ssdeep clustering kit☆20Updated 7 years ago
- ☆28Updated 6 months ago
- ☆13Updated 4 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 6 months ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- Tools for inspecting YARA bytecode☆17Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- Triton based symbolic emulator☆16Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago