PE Import Hash Generator
☆79Jul 17, 2017Updated 8 years ago
Alternatives and similar repositories for ImpHash-Generator
Users that are interested in ImpHash-Generator are comparing it to the libraries listed below
Sorting:
- Malware.lu tools☆63Oct 28, 2013Updated 12 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Symbol hash for ELF files☆115Feb 9, 2022Updated 4 years ago
- ☆280Apr 6, 2023Updated 2 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 11 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- PowerShell script for hunting webshells on Microsoft Exchange Servers.☆56Feb 1, 2017Updated 9 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Yaras Random☆23Feb 21, 2019Updated 7 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- ☆50Apr 10, 2016Updated 9 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆41Apr 19, 2023Updated 2 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Configurations for DFIR ORC☆28Mar 28, 2024Updated last year
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆279Mar 1, 2023Updated 3 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- ☆16May 22, 2014Updated 11 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- Yara rules for malware families seen as part of targeted threats project☆141Nov 17, 2016Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- A YARA-integrated process denial framework for Windows☆398Feb 15, 2020Updated 6 years ago