MalwareLu / malware-lu
Automatically exported from code.google.com/p/malware-lu
☆55Updated 5 years ago
Alternatives and similar repositories for malware-lu:
Users that are interested in malware-lu are comparing it to the libraries listed below
- Collection of my Python Scripts☆41Updated 4 years ago
- ripPE - section extractor and profiler for PE file analysis☆32Updated 10 years ago
- Malware.lu tools☆63Updated 11 years ago
- ☆68Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- Modified edition of cuckoo community modules☆32Updated 5 years ago
- A warehouse for your malware☆134Updated 11 years ago
- ☆19Updated 6 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 8 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Volatility Plugins☆21Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- openioc_scan Volatility Framework plugin☆42Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 4 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Updated 8 years ago
- ☆52Updated 9 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- IDATACO IDA Pro Plugin☆47Updated 8 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- ☆27Updated 8 years ago
- ☆44Updated 6 years ago
- Static and automated/dynamic malware analysis☆46Updated 9 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Cryptowall Tooling & Information☆34Updated 9 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- ☆43Updated 4 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆86Updated 6 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago