Vi45en / PesidiousLinks
☆13Updated 3 years ago
Alternatives and similar repositories for Pesidious
Users that are interested in Pesidious are comparing it to the libraries listed below
Sorting:
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- Framework for Adversarial Malware Evaluation.☆35Updated 8 months ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Repository of Yara rules created by the Stratosphere team☆28Updated 4 years ago
- ☆14Updated 6 years ago
- ☆26Updated 2 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- ☆25Updated 5 years ago
- IoC's, PCRE's, YARA's etc☆24Updated 8 months ago
- static malware analysis and report tool open source version for linux☆17Updated 8 years ago
- ☆13Updated 5 years ago
- Botnet Simulation Framework☆77Updated 5 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- Small fuzzing library with an example script using it.☆20Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 5 years ago
- ☆23Updated 2 years ago
- This is a repository that is meant to hold detections for various process injection techniques.☆34Updated 5 years ago
- ☆42Updated 3 years ago
- Community-based integrated malware identification system☆82Updated 3 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- ☆10Updated 5 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 4 years ago