Vi45en / PesidiousLinks
☆13Updated 2 years ago
Alternatives and similar repositories for Pesidious
Users that are interested in Pesidious are comparing it to the libraries listed below
Sorting:
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- Framework for Adversarial Malware Evaluation.☆34Updated 5 months ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- ☆13Updated 7 years ago
- ☆25Updated 5 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- Repository of Yara rules created by the Stratosphere team☆27Updated 4 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated last year
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- static malware analysis and report tool open source version for linux☆17Updated 8 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Botnet Simulation Framework☆77Updated 5 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 7 years ago
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- IoC's, PCRE's, YARA's etc☆24Updated 5 months ago
- ☆13Updated 4 years ago
- Malware samples observed in the wild from time to time☆12Updated 6 years ago
- ☆22Updated 2 years ago
- A curated list of awesome malware analysis tools and resources☆44Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- This is a repository that is meant to hold detections for various process injection techniques.☆34Updated 5 years ago
- All in one - Malware + Analysis by Cylance☆11Updated 6 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- ☆41Updated 3 years ago