danielplohmann / mcritLinks
The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash algorithm in the context of code similarity.
☆95Updated 2 weeks ago
Alternatives and similar repositories for mcrit
Users that are interested in mcrit are comparing it to the libraries listed below
Sorting:
- ☆63Updated 4 years ago
- Tools for inspecting YARA bytecode☆21Updated 5 years ago
- Robust Automated Malware Unpacker☆86Updated 2 years ago
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆52Updated 2 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆82Updated 3 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- Symbol hash for ELF files☆111Updated 3 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- IDA python plugin to scan binary with Yara rules☆180Updated last year
- Automatically generate AV byte signatures from sets of similar binaries.☆284Updated 11 months ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Capa analysis importer for Ghidra.☆63Updated 5 years ago
- Use YARA rules on Time Travel Debugging traces☆96Updated 2 years ago
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Updated 5 months ago
- ☆111Updated 2 months ago
- Malware Configuration Extraction Modules☆51Updated 2 years ago
- Malware dynamic instrumentation tool based on frida framework☆110Updated 5 years ago
- Yet another rule generator for Yara☆29Updated 6 months ago
- A golang CLI tool to download malware from a variety of sources.☆151Updated 5 months ago
- ☆73Updated 2 years ago
- Maco - Malware config extractor framework☆41Updated 2 months ago
- Writeups for CTF challenges☆33Updated 2 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58Updated 4 years ago
- ☆53Updated 7 years ago
- ☆15Updated 3 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Set of tools to analyze Tinynuke samples☆15Updated 4 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆115Updated 3 years ago
- ☆109Updated 2 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆120Updated 8 months ago