ccied / ugforum-analysis
Tools for Automated Analysis of Cybercriminal Markets
☆51Updated 6 years ago
Alternatives and similar repositories for ugforum-analysis:
Users that are interested in ugforum-analysis are comparing it to the libraries listed below
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 7 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- POLAR☆73Updated 6 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- integrating bro into yara☆33Updated 10 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- ☆112Updated 7 years ago
- ☆46Updated 8 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- Volatility Plugins☆21Updated 9 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 5 years ago
- ActionScript3 dynamic instrumentation tool☆36Updated 8 years ago
- Manage VT Alerts☆62Updated 8 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- ☆21Updated 9 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 8 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆77Updated 9 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- DNSDB query scripts☆75Updated 5 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago