snake - a malware storage zoo
☆217Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for snake
Users that are interested in snake are comparing it to the libraries listed below
Sorting:
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- ☆79Aug 4, 2022Updated 3 years ago
- Pre-OS microcode updater☆43Aug 25, 2018Updated 7 years ago
- Open source Active Directory security audit framework.☆137Jan 15, 2018Updated 8 years ago
- Tool for introspection of SSL\TLS sessions☆142Jan 26, 2026Updated last month
- ANWI - All New Wireless IDS☆29Aug 3, 2018Updated 7 years ago
- Open Source Threat Intelligence Chat Bot☆322Mar 30, 2020Updated 5 years ago
- ☆137Mar 20, 2019Updated 6 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆209Nov 16, 2018Updated 7 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆289Apr 14, 2025Updated 10 months ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆424Updated this week
- ☆349Mar 19, 2021Updated 4 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- Collecting & Hunting for IOCs with gusto and style☆240Aug 1, 2021Updated 4 years ago
- Burp extension to help developers replicate findings from pen tests☆70Jul 22, 2024Updated last year
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- DejaVU - Open Source Deception Framework☆426Aug 2, 2025Updated 6 months ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 7 years ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,855Apr 3, 2023Updated 2 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆279Dec 13, 2021Updated 4 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆177Jun 10, 2021Updated 4 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Oct 26, 2022Updated 3 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆208Mar 12, 2025Updated 11 months ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆218Jul 17, 2020Updated 5 years ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated 3 weeks ago
- Kaspersky's GReAT KLara☆732Jul 24, 2024Updated last year
- Collaborative malware analysis framework☆381Jan 22, 2019Updated 7 years ago
- ☆98Oct 7, 2020Updated 5 years ago