A virtual PDF analysis framework
☆17Jan 31, 2014Updated 12 years ago
Alternatives and similar repositories for phoneypdf
Users that are interested in phoneypdf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Aug 13, 2016Updated 9 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Web Interface Portal & Security Threat Engine for REMnux☆24Aug 1, 2016Updated 9 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- android malware detection☆12Mar 16, 2016Updated 10 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- A tool for harvesting sysadmin credentials in Linux☆20Jul 10, 2024Updated last year
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- IRMA probe☆25Nov 28, 2016Updated 9 years ago
- The Network File Extractor☆11Feb 27, 2014Updated 12 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- ☆10Mar 27, 2017Updated 9 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- SQLite3 with encryption support☆23Jan 3, 2020Updated 6 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Yara rules for malware families seen as part of targeted threats project☆143Nov 17, 2016Updated 9 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- not the worst forensics regexp—this is not the primary repo; caveat programmer☆30May 7, 2019Updated 6 years ago