dod-cyber-crime-center / kordesii
☆16Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for kordesii
- ☆41Updated 6 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆74Updated 2 years ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Updated 6 years ago
- Various Yara signatures (possibly to be included in a release later).☆85Updated 5 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- ☆51Updated 6 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆73Updated 10 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Yaras Random☆18Updated 5 years ago
- Modified edition of cuckoomon☆48Updated 6 years ago
- ☆22Updated 5 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆32Updated 5 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆22Updated 6 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 9 years ago
- Go Lang Portable Executable Parser☆37Updated 3 years ago
- Steezy - Ghetto Yara Generation☆15Updated last year
- TA505 unpacker Python 2.7☆46Updated 4 years ago
- ☆42Updated 4 years ago
- Analysis PE file or Shellcode☆48Updated 8 years ago
- ☆26Updated 7 years ago
- Modified edition of cuckoo community modules☆31Updated 5 years ago
- Volatility Plugins☆21Updated 9 years ago
- QEMU with rVMI extensions☆25Updated 7 years ago
- A tool to generate yara signatures from function blocks☆19Updated 9 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- A collection of Volatility Framework plugins.☆26Updated 11 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Updated 8 years ago