BLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a Command-and-Control (C&C) architecture
☆32May 22, 2023Updated 2 years ago
Alternatives and similar repositories for ips-bph-framework
Users that are interested in ips-bph-framework are comparing it to the libraries listed below
Sorting:
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- A Docker container for Moloch based on minimal Debian☆26Jan 25, 2016Updated 10 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- ☆14Sep 24, 2012Updated 13 years ago
- ☆11Feb 14, 2025Updated last year
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 4 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- My personal tech blog☆16Dec 13, 2024Updated last year
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- This is a python version of samesame repo to generate homograph strings☆24Aug 22, 2018Updated 7 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- An asynchronous driver and toolkit for accessing MongoDB in Tornado☆56Nov 5, 2015Updated 10 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- High performance search for IP addresses and CIDR ranges☆35Updated this week
- ☆11Jun 5, 2020Updated 5 years ago
- SDN Laboratory☆11May 6, 2021Updated 4 years ago
- Dashboard Realtime Monitor Bridging BPJS Kesehatan☆16Jul 10, 2025Updated 8 months ago
- A radare2 Python script to dump a raw IA32 binary to an NASM source file☆32Dec 10, 2025Updated 3 months ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆119Jun 19, 2019Updated 6 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Server Benchmarking Script☆11Feb 21, 2014Updated 12 years ago
- Parsing of YARA rules into AST and building new rulesets in C++.☆129Jan 25, 2026Updated last month
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- FBTrueType is a standalone native ARM program for ROOTED Android devices, which renders TrueType text to the device display, using the ke…☆10Aug 23, 2015Updated 10 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- SDN Security and Monitoring Framework☆16Dec 8, 2022Updated 3 years ago
- Next major release of sniffMyPackets - Now with added packet loving☆12Mar 19, 2015Updated 11 years ago
- Automates credential skimming from service accounts in Windows Registry☆78Sep 29, 2020Updated 5 years ago
- A sample REST api using the FastApi framework, exposing some Chuck Norris facts.☆12Nov 21, 2019Updated 6 years ago