eurecom-s3 / x-ray-tlsLinks
Generic and transparent TLS inspection for local programs
☆24Updated 11 months ago
Alternatives and similar repositories for x-ray-tls
Users that are interested in x-ray-tls are comparing it to the libraries listed below
Sorting:
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆62Updated 2 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated 2 years ago
- ☆53Updated 11 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 8 months ago
- ☆16Updated last year
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- Use YARA rules on Time Travel Debugging traces☆93Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆15Updated 2 years ago
- Symantec EDR Internals☆28Updated 4 years ago
- ☆48Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆26Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆67Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- Maco - Malware config extractor framework☆41Updated last week
- ☆33Updated 10 months ago
- Windows (ShadowMove) Socket Duplication☆87Updated 5 years ago
- ☆25Updated last year
- Identifies metadata of .NET binary files.☆21Updated last year
- A C++ Yara Rule Runner☆12Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- Repository of vulnerabilities disclosed by ESET☆28Updated 3 years ago
- ☆82Updated last month
- Powershell script deobfuscation using AST in Python☆72Updated 3 weeks ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆48Updated 10 months ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago