MacDue / ssdeep-windows-32_64Links
ssdeep for python on windows
☆18Updated 7 years ago
Alternatives and similar repositories for ssdeep-windows-32_64
Users that are interested in ssdeep-windows-32_64 are comparing it to the libraries listed below
Sorting:
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- ☆12Updated 3 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58Updated 4 years ago
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 4 years ago
- Yet another rule generator for Yara☆29Updated 5 months ago
- Automatic Malware Signature Generation Tool☆16Updated 4 years ago
- A malware dataset curation tool which helps identify packed samples.☆33Updated 7 years ago
- Parsing of YARA rules into AST and building new rulesets in C++.☆129Updated 2 months ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- ☆40Updated last year
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Updated 3 years ago
- ☆15Updated 2 years ago
- Robust API monitoring system presented in the paper "Designing Robust API Monitoring Solutions" (IEEE TDSC)☆24Updated 3 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- Maco - Malware config extractor framework☆41Updated last month
- Python module to extract Ascii, Utf8, and Unicode strings from binary data. Lightning fast wrapper around c++ compiled code.☆53Updated 4 months ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆86Updated last month
- Dataset of packed PE samples☆39Updated last year
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆11Updated 4 years ago
- ☆14Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆75Updated last month
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 9 months ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Updated 3 years ago
- Tools for inspecting YARA bytecode☆21Updated 5 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 6 years ago
- Utilities for working with vivisect☆25Updated last month
- ☆28Updated 5 years ago
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆18Updated 2 years ago
- A set of small utilities, helpers for PIN tracers☆35Updated last month
- Authenticode-parser is a simple C library for Authenticode format parsing using OpenSSL.☆19Updated last year