evilsocket / ergo-pe-av
π§ π¦ An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.
β173Updated 5 years ago
Related projects: β
- β237Updated this week
- snake - a malware storage zooβ217Updated last year
- A malware analysis and classification tool.β193Updated 2 years ago
- Automatic Yara Rule Generationβ328Updated 8 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behaviorβ266Updated 4 years ago
- An open source script to perform malware static analysis on Portable Executableβ309Updated last year
- The pattern matching swiss knifeβ136Updated 4 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenalβ201Updated 2 years ago
- Cuckoo Sandbox Dockerfileβ321Updated 4 years ago
- Security ML models encoded as Yara rulesβ207Updated last year
- 16,432 Free Yara rules created byβ378Updated 5 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and manβ¦β299Updated 4 years ago
- For all these times you're asking yourself "what is this panel again?"β251Updated last year
- The Multiplatform Linux Sandboxβ258Updated 2 years ago
- This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map tβ¦β108Updated 4 years ago
- A Tool for Automatic Analysis of Malware Behaviorβ365Updated 5 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.β202Updated 10 years ago
- Set of tools for interacting with Malshareβ153Updated 4 years ago
- β218Updated this week
- Pattern Extractor for Obfuscated Codeβ295Updated 2 years ago
- Deception based detection techniques mapped to the MITREβs ATT&CK frameworkβ280Updated 6 years ago
- Generating YARA rules based on binary codeβ198Updated 2 years ago
- A Yara rule generator for finding related samples and huntingβ155Updated 2 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques β¦β278Updated 7 years ago
- Minimal, consistent Python API for building integrations with malware sandboxes.β134Updated 7 months ago
- β95Updated 3 years ago
- MoP - "Master of Puppets" - Advanced malware tracking frameworkβ82Updated 2 weeks ago
- Allows you to quickly query a Windows machine for RAM artifactsβ218Updated 4 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own researchβ253Updated 5 years ago
- Parse YARA rules and operate over them more easily.β172Updated 2 months ago