Automatically exported from code.google.com/p/verify-sigs
☆18Sep 2, 2016Updated 9 years ago
Alternatives and similar repositories for verify-sigs
Users that are interested in verify-sigs are comparing it to the libraries listed below
Sorting:
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 11 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- Tools for macOS Forensic Bootable media☆15May 20, 2020Updated 5 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago
- Malice PExecutable Plugin☆16Mar 19, 2021Updated 4 years ago
- A fork from http://create.stephan-brumme.com/hash-library/.☆16Jan 29, 2026Updated last month
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- analysis of visual basic code☆47Mar 25, 2018Updated 7 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- Malware Classification using Graph Clustering☆14Nov 12, 2012Updated 13 years ago
- Registry Miner☆14Apr 10, 2018Updated 7 years ago
- ☆22Jun 18, 2015Updated 10 years ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆23Jun 29, 2025Updated 8 months ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Feb 23, 2016Updated 10 years ago
- PE Import Hash Generator☆79Jul 17, 2017Updated 8 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 8 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82May 3, 2015Updated 10 years ago
- Automated malware unpacker☆121Mar 5, 2016Updated 9 years ago
- Shared yara rules☆30Mar 17, 2014Updated 11 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- ☆22Apr 10, 2020Updated 5 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Cuckoo Agent.☆23Feb 25, 2019Updated 7 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- ☆26Aug 6, 2021Updated 4 years ago
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago