malware-revealer / extractor
A library for binaries feature extraction
☆12Updated last month
Alternatives and similar repositories for extractor:
Users that are interested in extractor are comparing it to the libraries listed below
- Spot malwares using Machine Learning techniques☆51Updated 5 years ago
- Python modules which provide a suite of useful utilities for CTFs☆11Updated 5 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated last year
- ☆24Updated 5 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆12Updated 3 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆24Updated last year
- ☆30Updated 4 years ago
- writeups for Capture The Flag Competitions☆15Updated 2 years ago
- A tool to automatically decode and translate any TCP hexa payload data form any language to english.☆18Updated 2 years ago
- active directory query tool using LDAP Protocol , helps red teamer / penetration testers to validate users credentials , retrieve inform…☆12Updated 5 years ago
- ☆11Updated 4 years ago
- ☆15Updated 3 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆22Updated 2 years ago
- Packing detection tool for PE files☆22Updated last month
- ☆13Updated 5 years ago
- Open YARA scan- and search engine☆20Updated 3 weeks ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- ☆15Updated 3 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆29Updated last year
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 4 years ago
- Python emulator for Excel XLM macros.☆18Updated 4 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆14Updated 6 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆17Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated 2 months ago
- a collection of Advanced Malwares and APT tools for geek analysts to play with☆43Updated 3 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 8 months ago
- SNMP enumeration script☆12Updated 5 years ago