A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.
☆26Jan 5, 2019Updated 7 years ago
Alternatives and similar repositories for MeltingPot
Users that are interested in MeltingPot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Malware sample exchange system and API intended for Anti-Virus companies and researchers.☆16Aug 19, 2024Updated last year
- The PoC implementations for the Android code packing technique.☆14Jul 24, 2016Updated 9 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 5 years ago
- Automatically generate AV byte signatures from sets of similar binaries.☆286Dec 10, 2024Updated last year
- ☆15Dec 22, 2015Updated 10 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆92Oct 28, 2016Updated 9 years ago
- Zeek Junk Drawer - Just some scripts and a place to put them☆28Sep 22, 2020Updated 5 years ago
- CVE-2013-6282 exploit☆27Nov 18, 2013Updated 12 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆192Dec 19, 2015Updated 10 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Onion Salt git Repo☆28Mar 10, 2021Updated 5 years ago
- Disassembler written in C by Oleh Yuschuk (Olly, the OllyDbg creator), I fixed the makefile to run with BCC55 free commandline tools avai…☆25Jun 10, 2015Updated 10 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- A Yara rule generator for finding related samples and hunting☆164Sep 11, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Generating YARA rules based on binary code☆221Oct 7, 2021Updated 4 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Docker image for Go-code checks☆12Mar 18, 2017Updated 9 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- A python library for building and using hash databases.☆22Updated this week
- Synthesizing Framework Models for Symbolic Execution☆15Sep 15, 2016Updated 9 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆475Jun 16, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆42Jan 31, 2025Updated last year
- (DEPRECATED) Python bindings for Broccoli☆13Apr 26, 2019Updated 6 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- reading lists☆32Jan 29, 2019Updated 7 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago