mik854e / AntivirusLinks
Virus Detection using Bayesian Analysis.
☆21Updated 11 years ago
Alternatives and similar repositories for Antivirus
Users that are interested in Antivirus are comparing it to the libraries listed below
Sorting:
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- MySQL UDF skeleton project☆20Updated 5 years ago
- Antivirus engine that allows you to create your own anti-virus☆10Updated 12 years ago
- REST API based malware repository (abandoned)☆107Updated 10 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Updated 10 years ago
- ☆36Updated 10 years ago
- A honeypot for malware that propagates via USB storage devices☆99Updated 10 years ago
- Automatically exported from code.google.com/p/jsunpack-n☆165Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 11 years ago
- Declarative syntax for defining sets of URLs. No need for error-prone regexs.☆21Updated 6 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Updated 6 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- Tor research framework in Java☆56Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- VirusTotal tools☆92Updated 4 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆104Updated 9 years ago
- A simple (and rather ad-hoc) port scanner for Tor hidden services.☆29Updated 10 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- An advanced memory forensics framework☆25Updated 11 years ago
- Yara rules for malware families seen as part of targeted threats project☆141Updated 8 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆90Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Public Profile Repository for Rekall Memory Forensic.☆100Updated 5 years ago
- A PE Header-Based Antivirus Tool☆11Updated 10 years ago