danielplohmann / mcritLinks
The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash algorithm in the context of code similarity.
☆94Updated 3 weeks ago
Alternatives and similar repositories for mcrit
Users that are interested in mcrit are comparing it to the libraries listed below
Sorting:
- ☆60Updated 4 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago
- Robust Automated Malware Unpacker☆85Updated 2 years ago
- Symbol hash for ELF files☆112Updated 3 years ago
- Use YARA rules on Time Travel Debugging traces☆92Updated 2 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆70Updated last year
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆51Updated 2 years ago
- Tools for inspecting YARA bytecode☆21Updated 5 years ago
- Automatically generate AV byte signatures from sets of similar binaries.☆280Updated 9 months ago
- IDA python plugin to scan binary with Yara rules☆178Updated last year
- Capa analysis importer for Ghidra.☆62Updated 4 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Yet another rule generator for Yara☆29Updated 4 months ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- ☆110Updated 3 weeks ago
- Malware Configuration Extraction Modules☆51Updated last year
- ☆72Updated 2 years ago
- Powershell script deobfuscation using AST in Python☆71Updated 2 weeks ago
- Maco - Malware config extractor framework☆41Updated this week
- Parsing of YARA rules into AST and building new rulesets in C++.☆127Updated 3 weeks ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58Updated 4 years ago
- Malware dynamic instrumentation tool based on frida framework☆109Updated 5 years ago
- ☆53Updated 7 years ago
- ☆15Updated 3 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆113Updated 3 years ago
- Automatic YARA rule generation for Malpedia☆161Updated 3 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- Set of tools to analyze Tinynuke samples☆15Updated 3 years ago