Compilation of peHash implementations.
☆14May 2, 2019Updated 6 years ago
Alternatives and similar repositories for pehash
Users that are interested in pehash are comparing it to the libraries listed below
Sorting:
- Yet another implementation of PEiD with yara☆17Jan 6, 2017Updated 9 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- Make datasets like FFRI Dataset☆13Jul 23, 2024Updated last year
- Malware Classification using Graph Clustering☆14Nov 12, 2012Updated 13 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆40Aug 2, 2012Updated 13 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- crabstone is a Ruby binding to the capstone disassembly library by Nguyen Anh Quynh☆19Aug 4, 2024Updated last year
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago
- Malice PExecutable Plugin☆16Mar 19, 2021Updated 5 years ago
- Simple yara decompiler☆17Apr 8, 2017Updated 8 years ago
- Converts the Clamav Virus Database definitions to YARA rules [GOLANG]☆52Feb 22, 2021Updated 5 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- Ruby FFI bindings for libpcap.☆41Mar 8, 2023Updated 3 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- Read TextMate syntax files and parse text with them☆17Jan 12, 2015Updated 11 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- ☆10Jan 21, 2015Updated 11 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- Demo Spree+Ionic Android/iOS App☆12Jun 4, 2015Updated 10 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- RTI Log Parser for Connext DDS is a command-line tool that processes and enhances Connext DDS log messages making it easier to debug appl…☆12Apr 23, 2019Updated 6 years ago
- A rotating socks proxy using Tor, Delegate and Haproxy☆14Feb 10, 2026Updated last month
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- Python bindings for ssdeep☆90Feb 6, 2022Updated 4 years ago
- Django site with user registration functionality powered by Userena.☆17Sep 22, 2013Updated 12 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- An implementation of the prediction strength algorithm from Tibshirani, Walther, Botstein, and Brown's "Cluster validation by prediction …☆18Feb 17, 2011Updated 15 years ago
- ☆14Oct 19, 2018Updated 7 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Binary Code Summarization☆14Apr 3, 2025Updated 11 months ago
- Information Propagation in a Social Network☆28Sep 10, 2011Updated 14 years ago
- This is a python simple tool for generating charts for ROC curve☆25Sep 22, 2010Updated 15 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago