A Maltego transform for VirusTotal vHash
☆32Oct 12, 2019Updated 6 years ago
Alternatives and similar repositories for VTvHash-Maltego
Users that are interested in VTvHash-Maltego are comparing it to the libraries listed below
Sorting:
- A Maltego transform for VirusTotal Submitter Information☆36May 15, 2019Updated 6 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 2 months ago
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- bitshred research project code.☆14Feb 12, 2016Updated 10 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- A configuration tool for Genshin Impact☆19Jan 31, 2024Updated 2 years ago
- Hansel - a simple but flexible search for IDA☆26Jul 11, 2019Updated 6 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54May 11, 2021Updated 4 years ago
- deprecated☆27Mar 20, 2019Updated 6 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30May 12, 2013Updated 12 years ago
- Python based angr plug in for IDA Pro.☆35Feb 25, 2018Updated 8 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- URL fingerprinting made easy☆89Apr 13, 2024Updated last year
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Jul 15, 2020Updated 5 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35May 27, 2016Updated 9 years ago
- Sigma Detection Rule Repository☆92Jun 18, 2020Updated 5 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 7 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- ☆10May 8, 2018Updated 7 years ago
- Artificial Dog to bark at deer and other garden pests using Raspberry Pi and Groundlight☆12Jun 19, 2024Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆102Aug 15, 2025Updated 6 months ago
- ☆43Nov 5, 2018Updated 7 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- ☆15May 6, 2021Updated 4 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- Accmut is a framework for acclerating mutation testing, which is based on LLVM-IR.☆10Jan 25, 2018Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago