malware-revealer / extractor
A library for binaries feature extraction
☆12Updated 5 months ago
Alternatives and similar repositories for extractor:
Users that are interested in extractor are comparing it to the libraries listed below
- Spot malwares using Machine Learning techniques☆52Updated 5 years ago
- Python modules which provide a suite of useful utilities for CTFs☆10Updated 5 years ago
- writeups for Capture The Flag Competitions☆16Updated 2 years ago
- A Python malware analysis library.☆50Updated 2 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated 2 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆27Updated 3 years ago
- a collection of Advanced Malwares and APT tools for geek analysts to play with☆43Updated 3 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- CyberGate Protector☆11Updated 8 years ago
- ☆49Updated 2 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 11 months ago
- Cryptanalysis and attack library☆22Updated 3 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆14Updated 6 years ago
- ☆17Updated 3 years ago
- Checkpot Honeypot Checker☆27Updated 6 years ago
- ☆15Updated 5 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 5 years ago
- A tool to automatically decode and translate any TCP hexa payload data form any language to english.☆17Updated 3 years ago
- Collection of some scripts I've written in Perl, Python BASH, GO and JS to automate some common ops.☆33Updated 6 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Updated last year
- Fast lookup server for NSRL and other hash database used in digital forensic☆44Updated 2 years ago
- Active Directory Group Policy Preferences cpassword cracker/decrypter.☆24Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆58Updated this week
- Documentation and proofs of concept on the polyglot file PEDICOM (PE executable + DICOM)☆34Updated 6 years ago
- Online client-side manager for secure storage and sharing of secrets.☆43Updated 3 years ago
- Volumetric Development☆11Updated last year
- KPMG Cyber Security Challenge 2017 questions repository and writeups☆19Updated 6 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago