PE Import Hash Generator
☆79Jul 17, 2017Updated 8 years ago
Alternatives and similar repositories for ImpHash-Generator
Users that are interested in ImpHash-Generator are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Malware.lu tools☆64Oct 28, 2013Updated 12 years ago
- Symbol hash for ELF files☆115Feb 9, 2022Updated 4 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Golang port of pefile☆25Jul 17, 2017Updated 8 years ago
- ☆280Apr 6, 2023Updated 2 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Dec 7, 2019Updated 6 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆41Apr 19, 2023Updated 2 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.☆77Dec 13, 2022Updated 3 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- PowerShell script for hunting webshells on Microsoft Exchange Servers.☆56Feb 1, 2017Updated 9 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- ☆50Apr 10, 2016Updated 9 years ago
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- ☆21Jan 28, 2020Updated 6 years ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆280Mar 1, 2023Updated 3 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Oct 26, 2023Updated 2 years ago
- A Python library and command line tools to provide interactive log visualization.☆144Dec 27, 2022Updated 3 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- zer0m0n driver for cuckoo sandbox☆87Jul 12, 2016Updated 9 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Fuzzy Hash calculated from import API of PE files☆90Aug 26, 2022Updated 3 years ago
- A YARA-integrated process denial framework for Windows☆397Feb 15, 2020Updated 6 years ago
- Python API for URL Query☆36May 22, 2016Updated 9 years ago