nao-sec / ektotal
[BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack
☆108Updated 2 years ago
Alternatives and similar repositories for ektotal:
Users that are interested in ektotal are comparing it to the libraries listed below
- Analyzing Rig Exploit Kit☆50Updated 7 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- Simple high-interactive client honeypot☆24Updated 7 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- ☆79Updated 2 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- Application for STIX v2.0 objects management and analysis☆27Updated 7 years ago
- snake - a malware storage zoo☆219Updated last year
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 10 years ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated last year
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 7 years ago
- Malware Repository Framework☆100Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 4 years ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆105Updated 4 years ago
- ☆68Updated 7 years ago
- Various scripts for different malware families☆104Updated 3 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Android Automation Tool☆21Updated 6 years ago
- RAT / Botnet Simulator for pentest / education☆81Updated 5 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- ☆134Updated 6 years ago
- general purpose and malware specific analysis tools☆102Updated 9 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- 高対話型ハニーポット☆27Updated 5 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- A script to track malware IOCs with OSINT on Twitter.☆53Updated 9 months ago