An Open Source Malware Analysis Pipeline System
☆157Jun 1, 2021Updated 4 years ago
Alternatives and similar repositories for aleph
Users that are interested in aleph are comparing it to the libraries listed below
Sorting:
- Mass static malware analysis tool☆94Feb 13, 2022Updated 4 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Malcom - Malware Communications Analyzer☆1,165Nov 29, 2017Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 11 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆399May 20, 2016Updated 9 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Malware static analysis framework☆185Apr 1, 2020Updated 5 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- ☆10Jun 22, 2025Updated 9 months ago
- H2HC 2016 Slides/Materials/Presentations☆28Dec 21, 2016Updated 9 years ago
- Web interface for the Volatility Memory Forensics Framework☆259Nov 21, 2017Updated 8 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- Modified edition of cuckoo☆407Nov 21, 2017Updated 8 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- The PE file analysis toolkit☆767Mar 12, 2026Updated last week
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Cyber Intel Management☆51Jan 25, 2018Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Oct 30, 2013Updated 12 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Malware Repository Framework☆98Mar 5, 2018Updated 8 years ago
- A command line Swiss army knife for string and number conversions☆18Feb 27, 2026Updated 3 weeks ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Jul 27, 2017Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 4 months ago
- Modified edition of cuckoo community modules☆50May 12, 2017Updated 8 years ago