Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)
☆16Oct 19, 2016Updated 9 years ago
Alternatives and similar repositories for Static-Malware-Analysis
Users that are interested in Static-Malware-Analysis are comparing it to the libraries listed below
Sorting:
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Tools for VirusTotal☆37Nov 29, 2012Updated 13 years ago
- android malware detection☆12Mar 16, 2016Updated 9 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 4 months ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 7 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Fault code reader☆11Oct 31, 2016Updated 9 years ago
- CNNPRE: A CNN-Based Protocol Reverse Engineering Method☆10Jan 13, 2026Updated last month
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- ☆14Oct 5, 2013Updated 12 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Repository for team's work on the Microsoft Malware Classification Challenge Kaggle competition.☆11Mar 17, 2015Updated 10 years ago
- McAfee Active Response (MAR) client library for use with the OpenDXL Python Client☆10Mar 17, 2020Updated 5 years ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated last month
- CAN Firewall project☆13Dec 17, 2015Updated 10 years ago