BLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a Command-and-Control (C&C) architecture
☆32May 22, 2023Updated 2 years ago
Alternatives and similar repositories for ips-bph-framework
Users that are interested in ips-bph-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- ☆14Sep 24, 2012Updated 13 years ago
- ☆11Feb 14, 2025Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 5 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- My personal tech blog☆17Dec 13, 2024Updated last year
- ☆32Aug 30, 2019Updated 6 years ago
- SDN for Intra-Vehicular Networks☆10May 25, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This is a python version of samesame repo to generate homograph strings☆24Aug 22, 2018Updated 7 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago
- Python code and data for the post "Word Segmentation, or Makingsenseofthis"☆17Oct 24, 2022Updated 3 years ago
- ☆23May 28, 2021Updated 4 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- ☆13Dec 14, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Feb 20, 2024Updated 2 years ago
- 复现过的AI安全检测的项目集合☆45Oct 20, 2019Updated 6 years ago
- ☆11Jun 5, 2020Updated 5 years ago
- PKCS#11 Private Key Extractor☆12May 7, 2017Updated 9 years ago
- 🔓 Decrypt strings from a .NET module dump protected by Themida, the advanced windows software protection system☆20Mar 20, 2021Updated 5 years ago
- python 开发的兵器库. 收藏内容包括参考代码,实验,培训资料等☆12May 13, 2026Updated last week
- A radare2 Python script to dump a raw IA32 binary to an NASM source file☆33Dec 10, 2025Updated 5 months ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Miracle is a mini OpenFlow Controller.☆14Jun 8, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆120Jun 19, 2019Updated 6 years ago
- SDN project 2019 on Mininet☆13Aug 3, 2023Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆43Jan 30, 2022Updated 4 years ago
- The DearBytes remote integrity tool is an IDS (Intrusion Detection System) that keeps track of files on a remote server and logs an event…☆12Apr 18, 2019Updated 7 years ago
- Explore Job Objects on a Windows system☆83Sep 4, 2019Updated 6 years ago
- This plugin provides native instrumentation for monitoring Consul, including: Consul server service and cluster health, and querying the …☆13Apr 28, 2021Updated 5 years ago