cylance / MarkovObfuscate
Use Markov Chains to obfuscate data as other data
☆52Updated 8 years ago
Alternatives and similar repositories for MarkovObfuscate:
Users that are interested in MarkovObfuscate are comparing it to the libraries listed below
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- ☆53Updated 4 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- ☆59Updated 5 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆56Updated 3 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- ☆76Updated 6 years ago
- A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.☆19Updated 2 years ago
- Lazy Office Analyzer☆119Updated 8 years ago
- ☆46Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- ☆68Updated 7 years ago
- ☆50Updated 6 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 6 years ago
- Repository for my ATT&CK analysis research.☆69Updated 5 years ago
- XOR Key Extractor☆50Updated 7 months ago
- ☆52Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 4 months ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago