dasec / fishy
Toolkit for Filesystem based Data Hiding Techniques.
☆37Updated 5 years ago
Alternatives and similar repositories for fishy
Users that are interested in fishy are comparing it to the libraries listed below
Sorting:
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- XOR Key Extractor☆50Updated 9 months ago
- DEbian Cve REproducer Tool☆24Updated last year
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆34Updated 3 years ago
- ☆17Updated 8 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated last month
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated last year
- ☆55Updated 7 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 3 months ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- Data to test capa's code and rules.☆42Updated last week
- Standardized Malware Analysis Tool☆52Updated 4 years ago
- ☆23Updated last year
- Python based CLI for MalwareBazaar☆37Updated 6 months ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- YARA Language Server☆71Updated 2 weeks ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Static configuration extractor for the Karton framework☆10Updated 4 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated 2 months ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆24Updated 2 years ago
- A FUSE module to mount captured network data☆37Updated 2 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 6 months ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated 4 months ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated 2 months ago
- Volatility3 plugins developed and maintained by the community☆55Updated 2 years ago
- ☆14Updated 2 months ago
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago