malware-revealer / extractor
A library for binaries feature extraction
☆12Updated 4 months ago
Alternatives and similar repositories for extractor:
Users that are interested in extractor are comparing it to the libraries listed below
- Spot malwares using Machine Learning techniques☆51Updated 5 years ago
- Python modules which provide a suite of useful utilities for CTFs☆11Updated 5 years ago
- ☆15Updated 5 years ago
- active directory query tool using LDAP Protocol , helps red teamer / penetration testers to validate users credentials , retrieve inform…☆12Updated 5 years ago
- writeups for Capture The Flag Competitions☆16Updated 2 years ago
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆54Updated last week
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆18Updated 4 years ago
- ☆25Updated 5 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆46Updated 4 months ago
- ☆12Updated 2 years ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆32Updated 10 months ago
- A Python malware analysis library.☆50Updated last year
- Collection of red machine learning projects☆40Updated 3 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆10Updated 5 months ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- CveXplore☆38Updated this week
- Polyglot detector☆21Updated 11 months ago
- Creating attacks based on polyglot files. This tool (experimental) is useful in offensive security (stego malware, privilege escalation, …☆9Updated 5 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 3 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated last year
- Industrial Hacking Simulator☆26Updated 2 months ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Course Material☆19Updated 5 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Updated 2 years ago
- A ping detection tool for linux☆24Updated 4 years ago
- ☆11Updated 5 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆27Updated 3 years ago
- ☆35Updated 6 years ago
- Compiled executables of common crypto and encoding algorithms☆16Updated last year
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 4 years ago