joxeankoret / cosa-nostra
Cosa Nostra, a FOSS graph based malware clusterization toolkit.
☆230Updated last year
Alternatives and similar repositories for cosa-nostra:
Users that are interested in cosa-nostra are comparing it to the libraries listed below
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 5 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- rVMI - A New Paradigm For Full System Analysis☆355Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 4 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆301Updated 4 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆264Updated 3 years ago
- Your bag of handy codes for malware researchers☆120Updated 5 years ago
- A tool to detect and crash Cuckoo Sandbox☆292Updated 8 months ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 7 years ago
- Small tool for disassembling shellcode (using objdump)☆146Updated 2 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- ☆91Updated 8 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Updated 9 years ago
- PyAna - Analyzing the Windows shellcode☆247Updated 9 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Collaborative malware analysis framework☆375Updated 6 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Automated malware unpacker☆119Updated 9 years ago
- ☆75Updated 8 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Various snippets created during malware analysis☆458Updated 2 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- Malware Repository Framework☆100Updated 7 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- Offline debugger for malware's reverse engineering☆113Updated 10 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago