Frontend for Codex Gigas
☆21Mar 6, 2017Updated 9 years ago
Alternatives and similar repositories for codex-frontend
Users that are interested in codex-frontend are comparing it to the libraries listed below
Sorting:
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- Dockerized Cuckoo build☆10Aug 3, 2016Updated 9 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- McAfee Threat Intelligence Exchange (TIE) client library for use with the OpenDXL Python Client☆15Mar 17, 2020Updated 6 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- Get USB Devices from Registry hives☆22Nov 15, 2021Updated 4 years ago
- Fast multipattern regular expression searching for digital forensics☆18Jul 31, 2019Updated 6 years ago
- X-Ways C# X-Tension API☆15May 28, 2013Updated 12 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Aug 31, 2012Updated 13 years ago
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Feb 3, 2026Updated last month
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- ☆45Aug 16, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/jsunpack-n☆168Apr 2, 2015Updated 10 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- Simple single-file FUSE implementation of copy-on-write☆10Aug 14, 2014Updated 11 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Malware Control Monitor☆88Mar 2, 2015Updated 11 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago