Vi45en / PesidiousLinks
☆13Updated 2 years ago
Alternatives and similar repositories for Pesidious
Users that are interested in Pesidious are comparing it to the libraries listed below
Sorting:
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Updated 6 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Framework for Adversarial Malware Evaluation.☆35Updated 7 months ago
- ☆25Updated 5 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 7 years ago
- IoC's, PCRE's, YARA's etc☆24Updated 7 months ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- All in one - Malware + Analysis by Cylance☆11Updated 6 years ago
- ☆13Updated 7 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆42Updated 3 years ago
- PDF Malware Parser☆20Updated 9 years ago
- ☆43Updated 7 years ago
- static malware analysis and report tool open source version for linux☆17Updated 8 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 6 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Malware samples observed in the wild from time to time☆12Updated 6 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- CVE-2019-12949☆26Updated 6 years ago
- Malice Office/OLE/RTF Plugin☆13Updated 7 years ago
- Repository of Yara rules created by the Stratosphere team☆28Updated 4 years ago
- ☆12Updated 5 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago