A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster visually similar images together. The script computes the Average Hash of each extracted image, then graphs the images if they meet the similarity threshold. The script can be used as a technique for visually iden…
☆23Dec 12, 2021Updated 4 years ago
Alternatives and similar repositories for graph-maldoc-similar-images
Users that are interested in graph-maldoc-similar-images are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- The Best Linewize Hacks/Mods to Date☆12Apr 30, 2023Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- ☆13Oct 29, 2022Updated 3 years ago
- A tello GUI controller based on Qt☆10Jan 3, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 7 months ago
- Scripting together some of my favorite Python tools for doing initial triage of a suspected malicious document (e.g. PDF, DOC, DOCX, XSLM…☆17Mar 8, 2022Updated 4 years ago
- A decryptor for systems infected by Avaddon ransomware.☆25Oct 29, 2024Updated last year
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 4 months ago
- A simple Golang program to collect proxies☆13Aug 9, 2019Updated 6 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆25Jan 8, 2024Updated 2 years ago
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated 2 months ago
- ☆12Jun 3, 2022Updated 3 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- A simple IDA Pro plugin to show all HexRays decompiler comments written by user☆23Sep 3, 2021Updated 4 years ago
- List of tools to assist in analyzing samples of ISFB/Gozi/Ursnif☆15Jul 17, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆15Nov 25, 2021Updated 4 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- 阿里2015第二届安全挑战赛第三题题解☆24Jun 14, 2021Updated 4 years ago
- HACKED GOOGLE FORMS!!!!! hello sicsr peeps bored of filling feed back form? This code can help you out. This is only for educational purp…☆14Mar 10, 2018Updated 8 years ago
- Une interface python permettant de récupérer simplement des informations de l'API (devoirs, notes,...)☆11Oct 1, 2022Updated 3 years ago
- Auto Answer Quizlet Hack☆14Dec 23, 2021Updated 4 years ago
- Automatically identify and highlight targets (Russian soldiers, right-wing extremists etc) in visualized social networks☆23Sep 4, 2022Updated 3 years ago
- Hyden Software is a Python program designed for video creation. While it displays several advanced features such as cryptocurrency mining…☆12Feb 9, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Tools that trigger False Positive AV alerts☆56Dec 24, 2024Updated last year
- A list of Mitre Caldera compatible emulation-plans☆14Feb 1, 2021Updated 5 years ago
- Collection of scripts provided for public use☆42Apr 9, 2026Updated last week
- Miner Tron Via Consola, termux o cmd☆12Feb 28, 2022Updated 4 years ago
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated 2 months ago
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated 3 months ago