Python bindings for ssdeep
☆90Feb 6, 2022Updated 4 years ago
Alternatives and similar repositories for pydeep
Users that are interested in pydeep are comparing it to the libraries listed below
Sorting:
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- not the worst forensics regexp—this is not the primary repo; caveat programmer☆30May 7, 2019Updated 6 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Aug 4, 2014Updated 11 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Export Maltego Graphs to JSON format☆21Nov 9, 2017Updated 8 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- Yara rules for malware families seen as part of targeted threats project☆141Nov 17, 2016Updated 9 years ago
- Public Profile Repository for Rekall Memory Forensic.☆101Oct 20, 2020Updated 5 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 8 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Bro scripts to monitor for new hosts within a subnet range that aren't whitelisted/vetted.☆13Jun 28, 2013Updated 12 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆279Mar 1, 2023Updated 3 years ago
- Digital Forensic Investigative Scripts☆87Feb 6, 2026Updated 3 weeks ago
- Digital Forensics Windows Registry (dfWinReg)☆54Dec 22, 2025Updated 2 months ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 5 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- Virus Total Lookup Script☆14Aug 18, 2015Updated 10 years ago
- Scans a system for potential credit cards for PCI DSS compliance☆16Oct 30, 2016Updated 9 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 6 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Jan 7, 2013Updated 13 years ago
- ☆280Apr 6, 2023Updated 2 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- ☆13Apr 8, 2022Updated 3 years ago