Python bindings for ssdeep
☆90Feb 6, 2022Updated 4 years ago
Alternatives and similar repositories for pydeep
Users that are interested in pydeep are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Basic file metadata gathering script☆21Apr 16, 2025Updated 11 months ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Aug 4, 2014Updated 11 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- Yara rules for malware families seen as part of targeted threats project☆141Nov 17, 2016Updated 9 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- not the worst forensics regexp—this is not the primary repo; caveat programmer☆30May 7, 2019Updated 6 years ago
- Compilation of peHash implementations.☆14May 2, 2019Updated 6 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- Bro scripts to monitor for new hosts within a subnet range that aren't whitelisted/vetted.☆13Jun 28, 2013Updated 12 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- A warehouse for your malware☆20Feb 25, 2013Updated 13 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- Export Maltego Graphs to JSON format☆21Nov 9, 2017Updated 8 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆280Mar 1, 2023Updated 3 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Easy & Flexible Alerting With ElasticSearch☆19Dec 18, 2015Updated 10 years ago
- Repository of modules and signatures contributed by the community☆332Feb 22, 2023Updated 3 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Automatic Yara Rule Generation☆333Feb 2, 2016Updated 10 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Public Profile Repository for Rekall Memory Forensic.☆101Oct 20, 2020Updated 5 years ago
- Extract Icon from PE Executable using Python☆26Jul 2, 2023Updated 2 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 9 years ago
- Python Malware Crawler for Zoos and Repositories☆109Apr 9, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Auto Installer Script for Cuckoo Sandbox☆164May 31, 2018Updated 7 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago