Automatically exported from code.google.com/p/verify-sigs
☆18Sep 2, 2016Updated 9 years ago
Alternatives and similar repositories for verify-sigs
Users that are interested in verify-sigs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago
- Malice PExecutable Plugin☆16Mar 19, 2021Updated 5 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Malware Classification using Graph Clustering☆14Nov 12, 2012Updated 13 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- A fork from http://create.stephan-brumme.com/hash-library/.☆16Jan 29, 2026Updated last month
- ☆22Apr 10, 2020Updated 5 years ago
- analysis of visual basic code☆47Mar 25, 2018Updated 7 years ago
- Cuckoo Agent.☆23Feb 25, 2019Updated 7 years ago
- PE Import Hash Generator☆79Jul 17, 2017Updated 8 years ago
- ☆22Jun 18, 2015Updated 10 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 8 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Feb 23, 2016Updated 10 years ago
- Automated malware unpacker☆121Mar 5, 2016Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Mar 4, 2024Updated 2 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Tools for macOS Forensic Bootable media☆16May 20, 2020Updated 5 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆24Jun 29, 2025Updated 8 months ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago