A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster visually similar images together. The script computes the Average Hash of each extracted image, then graphs the images if they meet the similarity threshold. The script can be used as a technique for visually iden…
☆23Dec 12, 2021Updated 4 years ago
Alternatives and similar repositories for graph-maldoc-similar-images
Users that are interested in graph-maldoc-similar-images are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- ☆13Oct 29, 2022Updated 3 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- A serverless application for processing AWS GuardDuty findings.☆11Sep 7, 2018Updated 7 years ago
- A simple Golang program to collect proxies☆13Aug 9, 2019Updated 6 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- ☆12Nov 21, 2023Updated 2 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆25Jan 8, 2024Updated 2 years ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated last month
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- ☆15Apr 8, 2023Updated 2 years ago
- This IDA Python plugin is intended to get you started creating IDA Plugins with Python, recognize the importance of deobfuscating strings…☆30Dec 16, 2020Updated 5 years ago
- ☆12Jun 3, 2022Updated 3 years ago
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Sep 4, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- 阿里2015第二届安全挑战赛第三题题解☆23Jun 14, 2021Updated 4 years ago
- Examples of the inner workings of the WinCrypto API☆15Jan 2, 2018Updated 8 years ago
- List of tools to assist in analyzing samples of ISFB/Gozi/Ursnif☆15Jul 17, 2019Updated 6 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆23Nov 19, 2018Updated 7 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Automatically identify and highlight targets (Russian soldiers, right-wing extremists etc) in visualized social networks☆23Sep 4, 2022Updated 3 years ago
- Coordinates scrapers and interfaces with database☆20Aug 8, 2023Updated 2 years ago
- Tools that trigger False Positive AV alerts☆56Dec 24, 2024Updated last year
- Collection of scripts provided for public use☆41Updated this week
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated 2 months ago
- Parse .NET executable files.☆86Jan 31, 2026Updated last month