bitshred research project code.
☆14Feb 12, 2016Updated 10 years ago
Alternatives and similar repositories for bitshred
Users that are interested in bitshred are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compilation of peHash implementations.☆14May 2, 2019Updated 6 years ago
- Yet another implementation of PEiD with yara☆17Jan 6, 2017Updated 9 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- qDesktopSearch - a Qt5 Desktop App for indexing & searching the files of the local machine☆10May 3, 2016Updated 9 years ago
- Symbolic Execution over Falcon IL☆30Mar 13, 2026Updated last week
- C Bindings to BAP☆16Jul 13, 2022Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 5 months ago
- Image recognition on Spark cluster powered by Deeplearning4j and Apache Tika☆14May 16, 2017Updated 8 years ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Dec 18, 2023Updated 2 years ago
- Python implementation of the LZJD algorithm☆33Jul 10, 2025Updated 8 months ago
- Automatically generate AV byte signatures from sets of similar binaries.☆288Dec 10, 2024Updated last year
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- Software demonstrations for a course on Topological Data Analysis.☆12Mar 26, 2021Updated 4 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Jan 15, 2019Updated 7 years ago
- A benchmark suite containing 1 million compilable programs, mined from the largest public C repositories on GitHub.☆128Dec 18, 2019Updated 6 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Information Theory project : Implementation of JPEG Image Compression☆10Nov 5, 2019Updated 6 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Oct 30, 2013Updated 12 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- A GPU-accelerated differentiable fluid simulator written in JAX.☆11Feb 1, 2021Updated 5 years ago
- A PE Header-Based Antivirus Tool☆12Nov 14, 2014Updated 11 years ago
- A suite of Machine Learning / Deep Learning Dockerfiles to allow Apache Tika to extract objects and to produce textual captions for image…☆21Jun 18, 2024Updated last year
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- Linear Quadtree that allows neighboring cell access in constant time.☆11Jul 11, 2019Updated 6 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- ☆13Jun 23, 2018Updated 7 years ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆45Updated this week
- RTI Log Parser for Connext DDS is a command-line tool that processes and enhances Connext DDS log messages making it easier to debug appl…☆12Apr 23, 2019Updated 6 years ago
- ☆14Feb 8, 2015Updated 11 years ago
- RISC-V Soft CPU Security Contest by Thales and Microchip Technology☆12Jul 29, 2019Updated 6 years ago
- Deduplication of yara rules☆10Sep 18, 2017Updated 8 years ago
- matrix_calculus☆10Aug 4, 2022Updated 3 years ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago