Yelp / amiraView external linksLinks
AMIRA: Automated Malware Incident Response & Analysis
☆151Feb 3, 2026Updated last week
Alternatives and similar repositories for amira
Users that are interested in amira are comparing it to the libraries listed below
Sorting:
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆504Oct 21, 2022Updated 3 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Incident Response Forensic Framework☆611Nov 20, 2019Updated 6 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago
- Modular file scanning/analysis framework☆624Oct 8, 2019Updated 6 years ago
- An open source framework for enterprise level automated analysis.☆396Jun 27, 2022Updated 3 years ago
- FAME Automates Malware Evaluation☆926Dec 16, 2025Updated last month
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆554May 9, 2023Updated 2 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 5 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆111Aug 7, 2017Updated 8 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- A forensic evidence collection & analysis toolkit for OS X☆1,893Jun 19, 2019Updated 6 years ago
- Kirjuri is a web application for managing cases and physical forensic evidence items.☆107May 7, 2021Updated 4 years ago
- Endpoint detection & Malware analysis software☆229Dec 20, 2019Updated 6 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Droidefense: Advance Android Malware Analysis Framework☆478Dec 14, 2022Updated 3 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆479Jun 16, 2023Updated 2 years ago
- ☆25May 9, 2021Updated 4 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Sep 23, 2023Updated 2 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Updated this week
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆464Aug 14, 2025Updated 6 months ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Jan 7, 2020Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago