kbandla / phoneypdfView external linksLinks
A virtual PDF analysis framework
☆16Jan 31, 2014Updated 12 years ago
Alternatives and similar repositories for phoneypdf
Users that are interested in phoneypdf are comparing it to the libraries listed below
Sorting:
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Shared yara rules☆30Mar 17, 2014Updated 11 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- yara rules for cryptography detection☆30Apr 28, 2014Updated 11 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Aug 13, 2016Updated 9 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 12 years ago
- Yaras Random☆23Feb 21, 2019Updated 6 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- The Network File Extractor☆11Feb 27, 2014Updated 11 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- IRMA probe☆25Nov 28, 2016Updated 9 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Dec 30, 2013Updated 12 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- A PE Header-Based Antivirus Tool☆11Nov 14, 2014Updated 11 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Yara rules for malware families seen as part of targeted threats project☆142Nov 17, 2016Updated 9 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 2 years ago
- ☆16Sep 7, 2017Updated 8 years ago