a4lg / fast-ssdeep-clusLinks
Parallel ssdeep clustering kit
☆20Updated 8 years ago
Alternatives and similar repositories for fast-ssdeep-clus
Users that are interested in fast-ssdeep-clus are comparing it to the libraries listed below
Sorting:
- An example for implementation of ssdeep similarity search optimized with elasticsearch☆34Updated 8 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Validates yara rules and tries to repair the broken ones.☆41Updated 5 years ago
- Community-based integrated malware identification system☆81Updated 3 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Updated 7 years ago
- ssdeep based clustering tool☆14Updated 10 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 5 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Updated 2 years ago
- ☆19Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Fuzzy Hash calculated from import API of PE files☆91Updated 3 years ago
- ☆14Updated 7 years ago
- Client library for the mwdb service by CERT Polska.☆42Updated 4 months ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Updated 2 years ago
- Handy scripts to speed up malware analysis☆35Updated 2 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Updated 2 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 7 years ago
- A Python malware analysis library.☆50Updated 2 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Updated 6 years ago
- Telsy CTI Research Team☆57Updated 5 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- ☆44Updated 7 years ago
- Virustotal Data to Timesketch☆16Updated 6 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Updated 11 years ago
- ☆28Updated 8 years ago