Graph-theoretical investigation of a corpus of malware obtained from the web
☆21Jul 6, 2014Updated 11 years ago
Alternatives and similar repositories for konig
Users that are interested in konig are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Python Malware Crawler for Zoos and Repositories☆109Apr 9, 2018Updated 7 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- A collection of infosec related scripts and information.☆54Oct 2, 2024Updated last year
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- The Network File Extractor☆11Feb 27, 2014Updated 12 years ago
- Schema (SQL) and Data (JS) Migrations for node.js (for PostgreSQL and MySQL)☆29Sep 12, 2014Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- Datasette plugin that adds a .atom output format☆14Nov 2, 2025Updated 4 months ago
- Studio History is a revision control system written in pure javascript. It can be used for numerous things. The basic idea of Studio Hist…☆22Feb 11, 2012Updated 14 years ago
- Sondera Harness SDK for Agent Scaffolds for Python☆26Feb 27, 2026Updated 3 weeks ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Wrap radamsa on OSX, add instrumentation / triage.☆15Apr 22, 2016Updated 9 years ago
- A fake IoT toaster that mimics a login procedure on port 23 with the hopes of recording hacking attempts.☆10Oct 30, 2016Updated 9 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Datasette plugin for serving media based on a SQL query☆22Dec 13, 2022Updated 3 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 2 months ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Yara rules for malware families seen as part of targeted threats project☆141Nov 17, 2016Updated 9 years ago