mandiant / stringsifter
A machine learning tool that ranks strings based on their relevance for malware analysis.
☆705Updated 8 months ago
Alternatives and similar repositories for stringsifter:
Users that are interested in stringsifter are comparing it to the libraries listed below
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆569Updated last week
- Pattern Extractor for Obfuscated Code☆297Updated 3 years ago
- YARA malware query accelerator (web frontend)☆422Updated last week
- Volatility plugin for extracts configuration data of known malware☆487Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆706Updated 2 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆406Updated this week
- A Python package to interact with the Mitre ATT&CK Framework☆475Updated last year
- ReversingLabs YARA Rules☆804Updated this week
- IOC from articles, tweets for archives☆313Updated last year
- Malduck is your ducky companion in malware analysis journeys☆326Updated 9 months ago
- MBC content in markdown☆425Updated this week
- FAME Automates Malware Evaluation☆883Updated last week
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆235Updated last year
- Repository of YARA rules made by Trellix ATR Team☆583Updated 2 weeks ago
- Malware repository component for samples & static configuration with REST API interface.☆341Updated last week
- A collection of red team and adversary emulation resources developed and released by MITRE.☆499Updated 3 years ago
- Malware Configuration And Payload Extraction☆753Updated 4 months ago
- Binee: binary emulation environment☆514Updated 2 years ago
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆557Updated 2 years ago
- Online hash checker for Virustotal and other services☆822Updated last week
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆272Updated 5 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆373Updated 2 years ago
- Sophos-ReversingLabs 20 million sample dataset☆653Updated 3 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,287Updated 2 years ago
- Indicators from Unit 42 Public Reports☆710Updated last week
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,144Updated last year
- A malware analysis and classification tool.☆190Updated 3 years ago
- Security ML models encoded as Yara rules☆215Updated last year
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆449Updated 2 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 2 years ago