PSJoshi / malware-static-analysis
Static malware analysis using python
☆12Updated 6 years ago
Alternatives and similar repositories for malware-static-analysis:
Users that are interested in malware-static-analysis are comparing it to the libraries listed below
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆117Updated last year
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 5 months ago
- Create an entire YARA rule via Python? Whhhhhhaatttt?☆72Updated 6 years ago
- Mastering Malware Analysis, published by Packt☆38Updated 2 years ago
- ☆57Updated 3 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆33Updated 2 months ago
- Cockroach is your primitive & immortal swiss army knife.☆47Updated 3 years ago
- Various capabilities for static malware analysis.☆77Updated 5 months ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- MBC v2.x expressed in STIX 2.1 JSON☆15Updated last year
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- A mapping of used malware names to commonly known family names☆62Updated last year
- Ghidra plugin for https://analyze.intezer.com☆70Updated 2 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- Yet Another YARA rule Generator☆62Updated 6 years ago
- Binary Analysis Cookbook, published by Packt☆41Updated 2 years ago
- Python based CLI for MalwareBazaar☆36Updated 3 months ago
- Volumetric Development☆11Updated 11 months ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆19Updated this week
- ☆18Updated last year
- Parse YARA rules and operate over them more easily.☆181Updated 2 weeks ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆41Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Malware Data Science Reading Diary / Notes☆124Updated 5 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆20Updated 3 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago