dasec / fishyLinks
Toolkit for Filesystem based Data Hiding Techniques.
☆38Updated 5 years ago
Alternatives and similar repositories for fishy
Users that are interested in fishy are comparing it to the libraries listed below
Sorting:
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- yet another hidden LKM hunter☆25Updated last year
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆69Updated 3 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆56Updated 3 weeks ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- ☆43Updated last year
- Linpmem is a linux memory acquisition tool☆87Updated 2 months ago
- YARA Language Server☆71Updated 2 weeks ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Updated 4 years ago
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆39Updated 9 years ago
- YARI is an interactive debugger for YARA Language.☆88Updated 2 months ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- A feed of malware samples curated from threat intelligence sources.☆28Updated last year
- Sandbox samples and monitor them with kunai☆26Updated 2 months ago
- ☆30Updated 9 months ago
- Ghidra plugin for https://analyze.intezer.com☆71Updated 2 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated 8 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- DEbian Cve REproducer Tool☆25Updated last month
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Alternative YARA scanning engine☆72Updated 3 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆64Updated last year