A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.
☆26Jan 5, 2019Updated 7 years ago
Alternatives and similar repositories for MeltingPot
Users that are interested in MeltingPot are comparing it to the libraries listed below
Sorting:
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- ☆12Nov 4, 2019Updated 6 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- A demo of asynchronous generation of static html pages using Django 3.0 + Celery 4.4 + Redis 3.3.☆15Jan 6, 2022Updated 4 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 2 years ago
- A Collection of Android Malware☆18Feb 19, 2019Updated 7 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Dec 5, 2023Updated 2 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Zeek Junk Drawer - Just some scripts and a place to put them☆27Sep 22, 2020Updated 5 years ago
- Automatically generate AV byte signatures from sets of similar binaries.☆287Dec 10, 2024Updated last year
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- A python library for building and using hash databases.☆22Feb 8, 2023Updated 3 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- Radia is a tool designed to create an interactive and immerse environment to visualize code, and to augment the task of reverse engineeri…☆25Aug 23, 2017Updated 8 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 9 years ago
- ☆91Oct 28, 2016Updated 9 years ago
- Yet another rule generator for Yara☆29Jun 6, 2025Updated 8 months ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆107Mar 4, 2021Updated 5 years ago
- Ida Pro Ultimate Qt Build Guide☆27Dec 13, 2018Updated 7 years ago
- 简单验证码识别☆28Apr 11, 2016Updated 9 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Jan 14, 2026Updated last month
- reading lists☆32Jan 29, 2019Updated 7 years ago
- ☆10Apr 20, 2022Updated 3 years ago