Python command-line tool that uses nearest neighbor search methods for malware similarity analysis
☆16Jan 29, 2019Updated 7 years ago
Alternatives and similar repositories for rogers
Users that are interested in rogers are comparing it to the libraries listed below
Sorting:
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆33Jun 20, 2024Updated last year
- This Python script uses the pyClamd library to scan a specified file for malware using ClamAV antivirus engine. If malware is detected, i…☆14Dec 28, 2023Updated 2 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 9 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Wrap radamsa on OSX, add instrumentation / triage.☆15Apr 22, 2016Updated 9 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 2 months ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Windows file system driver which allows to block access to files at run-time (C/C++, C#, WDK, SDK)☆13Jan 1, 2023Updated 3 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 11 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Windows 64-bits driver☆17Dec 1, 2017Updated 8 years ago
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆15Updated this week
- ☆19Dec 1, 2024Updated last year
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- A taxonomy and dictionary of malware behaviors.☆43Aug 20, 2019Updated 6 years ago
- A fuzzer setup to fuzz libc functions.☆16Aug 30, 2022Updated 3 years ago
- DNS DDoS Defence and Countermeasure☆14Feb 17, 2016Updated 10 years ago
- Plugin based information gathering library☆28May 4, 2023Updated 2 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- ☆11Nov 28, 2016Updated 9 years ago