NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure
☆15Mar 14, 2014Updated 11 years ago
Alternatives and similar repositories for Malware-Probabilistic-Data-Structres
Users that are interested in Malware-Probabilistic-Data-Structres are comparing it to the libraries listed below
Sorting:
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Malice PExecutable Plugin☆16Mar 19, 2021Updated 4 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Malware Classification using Graph Clustering☆14Nov 12, 2012Updated 13 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 7 months ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Ida Pro Ultimate Qt Build Guide☆27Dec 13, 2018Updated 7 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated last month
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Aug 8, 2014Updated 11 years ago
- Dynamic malware analysis for the Android platform☆40Sep 26, 2014Updated 11 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Feb 17, 2015Updated 11 years ago
- Ipsumdump and other programs for command-line network trace manipulation.☆40Feb 16, 2024Updated 2 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- Malware Control Monitor☆88Mar 2, 2015Updated 10 years ago