jstrosch / graph-maldoc-similar-images
A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster visually similar images together. The script computes the Average Hash of each extracted image, then graphs the images if they meet the similarity threshold. The script can be used as a technique for visually iden…
☆21Updated 3 years ago
Alternatives and similar repositories for graph-maldoc-similar-images
Users that are interested in graph-maldoc-similar-images are comparing it to the libraries listed below
Sorting:
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Updated 2 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆13Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Generate YARA rules for OOXML documents.☆38Updated last year
- Merge all Yara rules from official Yara github repository in one .yar file☆29Updated 6 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆45Updated 2 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated 2 months ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated 4 months ago
- ☆15Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 4 years ago
- Static configuration extractor for the Karton framework☆10Updated 4 months ago
- Python based CLI for MalwareBazaar☆37Updated 6 months ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 4 years ago
- ☆27Updated 3 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Updated 2 years ago
- VirusTotal Intelligence Search☆37Updated 4 years ago
- ☆35Updated 3 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated 7 months ago
- This repository regroups the Yara Rules for the Unprotect Project☆25Updated 4 years ago
- Malware Configuration Extraction Modules☆49Updated last year
- ☆18Updated 4 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 3 years ago