maliceio / malice-avLinks
Malice AntiVirus Plugins
☆116Updated 6 years ago
Alternatives and similar repositories for malice-av
Users that are interested in malice-av are comparing it to the libraries listed below
Sorting:
- Converts the Clamav Virus Database definitions to YARA rules [GOLANG]☆52Updated 4 years ago
- ☆43Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆88Updated 9 years ago
- Tools for parsing rulesets using the exact grammar as YARA. Written in Go.☆85Updated 2 years ago
- ☆43Updated 6 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆40Updated 2 years ago
- Various Yara signatures (possibly to be included in a release later).☆87Updated 6 years ago
- BASS - BASS Automated Signature Synthesizer☆177Updated 6 years ago
- Modified edition of cuckoomon☆49Updated 7 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆206Updated 11 years ago
- A Yara rule generator for finding related samples and hunting☆159Updated 2 years ago
- Automated malware unpacker☆120Updated 9 years ago
- ☆52Updated 10 years ago
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆164Updated 2 years ago
- Offline debugger for malware's reverse engineering☆115Updated 10 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆83Updated last year
- A Python library to interface with a cuckoo-modified instance☆22Updated 8 years ago
- ☆97Updated 4 years ago
- DEPRECATED - replaced with "monitor"☆122Updated 9 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 8 years ago
- Parse YARA rules and operate over them more easily.☆191Updated 6 months ago
- ☆115Updated 9 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 6 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆95Updated 3 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆93Updated 10 years ago
- Generating YARA rules based on binary code☆215Updated 3 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 11 years ago
- An example for implementation of ssdeep similarity search optimized with elasticsearch☆34Updated 7 years ago
- Modified edition of cuckoo community modules☆32Updated 5 years ago
- Emulating Virtual Environment to stay protected against advanced malware☆100Updated 6 years ago