NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure
☆15Mar 14, 2014Updated 12 years ago
Alternatives and similar repositories for Malware-Probabilistic-Data-Structres
Users that are interested in Malware-Probabilistic-Data-Structres are comparing it to the libraries listed below
Sorting:
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Malice PExecutable Plugin☆16Mar 19, 2021Updated 5 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Malware Classification using Graph Clustering☆14Nov 12, 2012Updated 13 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- User-space Wireguard port forwarder☆15Aug 15, 2025Updated 7 months ago
- fast-scanner can make it easy for you to develop scanners☆12Jun 8, 2020Updated 5 years ago
- Dynamic WireGuard tunnel configuration.☆15Mar 8, 2023Updated 3 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Very concise example of integrated gradients (a method to reveal areas of attention in input images)☆10Jun 17, 2019Updated 6 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 7 months ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Just the docker install script☆30Apr 4, 2014Updated 11 years ago
- See how cluster analysis help us to get rid of the sea of financial metrics during portfolio construction☆13Jul 9, 2020Updated 5 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- HTTP Agent for tunneling proxies with persistent sockets☆11Feb 24, 2026Updated 3 weeks ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- (Re)Configuration toolkit☆14Feb 19, 2026Updated last month
- Sends public ip through e-mail. Command-line standalone.☆15Oct 16, 2016Updated 9 years ago
- Scapy implemented in GO Programming language☆21Sep 9, 2025Updated 6 months ago
- Python+Redis实现的BloomFilter☆15Nov 27, 2016Updated 9 years ago
- send SMS with Twilio and convert them to speech on your Raspberry Pi☆10Apr 14, 2015Updated 10 years ago
- EM Algorithm for Model-Based Clustering of Finite Mixture Gaussian Distribution☆17Sep 8, 2024Updated last year
- Program to perform kmeans clustering, kernel kmeans, and also spectral clustering (last 2 both based on RBF kernels).☆11Feb 9, 2018Updated 8 years ago
- Implementation of Probabilistic Principal Component Analysis☆13Dec 22, 2016Updated 9 years ago