Python command-line tool that uses nearest neighbor search methods for malware similarity analysis
☆16Jan 29, 2019Updated 7 years ago
Alternatives and similar repositories for rogers
Users that are interested in rogers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- ssdeep for python on windows☆20Feb 7, 2026Updated 2 months ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆33Jun 20, 2024Updated last year
- This Python script uses the pyClamd library to scan a specified file for malware using ClamAV antivirus engine. If malware is detected, i…☆14Dec 28, 2023Updated 2 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 9 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Sondera Harness SDK for Agent Scaffolds for Python☆26Feb 27, 2026Updated last month
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 3 months ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated 2 months ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- lite version of glib that only contains ghash, glist, gslist, gqueue, and gmem.☆13Feb 20, 2017Updated 9 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Windows file system driver which allows to block access to files at run-time (C/C++, C#, WDK, SDK)☆13Jan 1, 2023Updated 3 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Windows 64-bits driver☆17Dec 1, 2017Updated 8 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- ☆19Dec 1, 2024Updated last year
- A taxonomy and dictionary of malware behaviors.☆43Aug 20, 2019Updated 6 years ago
- A fuzzer setup to fuzz libc functions.☆16Aug 30, 2022Updated 3 years ago