danielplohmann / mcritLinks
The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash algorithm in the context of code similarity.
☆96Updated last week
Alternatives and similar repositories for mcrit
Users that are interested in mcrit are comparing it to the libraries listed below
Sorting:
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- ☆63Updated 4 years ago
- Symbol hash for ELF files☆112Updated 3 years ago
- Robust Automated Malware Unpacker☆87Updated 2 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆83Updated 3 years ago
- Tools for inspecting YARA bytecode☆21Updated 5 years ago
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆54Updated 2 years ago
- IDA python plugin to scan binary with Yara rules☆180Updated last year
- Yet another rule generator for Yara☆29Updated 7 months ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Automatically generate AV byte signatures from sets of similar binaries.☆285Updated last year
- Use YARA rules on Time Travel Debugging traces☆96Updated 2 years ago
- Malware dynamic instrumentation tool based on frida framework☆110Updated 5 years ago
- Capa analysis importer for Ghidra.☆63Updated 5 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 3 years ago
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Updated last month
- LERN GHIDRA☆93Updated 5 months ago
- ☆53Updated 7 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58Updated 4 years ago
- Malware Configuration Extraction Modules☆51Updated 2 years ago
- ☆73Updated 2 years ago
- A golang CLI tool to download malware from a variety of sources.☆151Updated 6 months ago
- Powershell script deobfuscation using AST in Python☆72Updated 3 months ago
- An IDA Pro extension for easier (malware) reverse engineering☆116Updated 3 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 10 months ago
- ☆111Updated 4 months ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- ☆15Updated 3 years ago
- pyGoRE - Python library for analyzing Go binaries☆66Updated 3 years ago
- Parsing of YARA rules into AST and building new rulesets in C++.☆129Updated last month