geekscrapy / binGraphLinks
Simple tool to graph files for quick analysis
☆56Updated last year
Alternatives and similar repositories for binGraph
Users that are interested in binGraph are comparing it to the libraries listed below
Sorting:
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- A FUSE module to mount captured network data☆39Updated last month
- Commandline utility to interact with the Malpedia service☆22Updated 5 years ago
- Ghidra plugin for https://analyze.intezer.com☆71Updated 2 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆67Updated 3 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- ☆47Updated 5 years ago
- Binary Protocol Differ☆119Updated 5 years ago
- A port of Kaitai to the Hiew hex editor☆150Updated 5 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- My collection of scripts for Ghidra (https://github.com/NationalSecurityAgency/ghidra)☆10Updated 4 years ago
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- Client library for the mwdb service by CERT Polska.☆40Updated this week
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 11 months ago
- Fuzzy Hash calculated from import API of PE files☆90Updated 2 years ago
- Parsing of YARA rules into AST and building new rulesets in C++.☆124Updated last month
- Trigram database written in C++, suited for malware indexing☆125Updated 9 months ago
- ☆52Updated 6 years ago
- Symbol hash for ELF files☆111Updated 3 years ago
- FileInsight-plugins: decoding toolbox of McAfee FileInsight hex editor for malware analysis☆162Updated 7 months ago
- ☆59Updated 4 years ago
- Yet Another YARA rule Generator☆64Updated 6 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- Capa analysis importer for Ghidra.☆62Updated 4 years ago
- Data to test capa's code and rules.☆42Updated last month
- ☆71Updated last year
- ☆83Updated 5 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- ☆29Updated 8 years ago