Public Issue tracker to gather feedback for and allow discussions around Malpedia
☆36Apr 25, 2022Updated 3 years ago
Alternatives and similar repositories for feedback
Users that are interested in feedback are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Jul 25, 2025Updated 8 months ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆263Mar 27, 2023Updated 3 years ago
- A Delphi symbol name recovery tool for reverse engineers.☆23Jan 17, 2026Updated 2 months ago
- ☆23Jun 1, 2023Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- ☆18May 30, 2025Updated 9 months ago
- ☆28Feb 13, 2017Updated 9 years ago
- ☆15Sep 26, 2022Updated 3 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 6 months ago
- Diaphora Machine Learning tools and datasets☆23Sep 23, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- ☆17Nov 13, 2024Updated last year
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Server-side SDK to provide a simple REST API for distribution of security information.☆17May 11, 2016Updated 9 years ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Apr 16, 2025Updated 11 months ago
- suricata-check is a command line utility to provide feedback on Suricata rules. The tool can detect various issues including those coveri…☆20Nov 21, 2025Updated 4 months ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆117Mar 2, 2026Updated 3 weeks ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆148Dec 8, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆80Mar 14, 2025Updated last year
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- Execute systemd services if current connection is not metered☆15Jul 11, 2019Updated 6 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆11Updated this week
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- ☆64Apr 1, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Deduplication of yara rules☆10Sep 18, 2017Updated 8 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆75Apr 18, 2024Updated last year
- ☆122Jan 29, 2026Updated last month
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago