nao-sec / ektotal
[BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack
☆107Updated 2 years ago
Alternatives and similar repositories for ektotal:
Users that are interested in ektotal are comparing it to the libraries listed below
- Analyzing Rig Exploit Kit☆50Updated 7 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- Community-based integrated malware identification system☆82Updated 2 years ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated last year
- Simple high-interactive client honeypot☆24Updated 7 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 10 years ago
- RAT / Botnet Simulator for pentest / education☆80Updated 5 years ago
- Application for STIX v2.0 objects management and analysis☆27Updated 7 years ago
- Simple DDE object detector☆55Updated 7 years ago
- Tool for dropping malware from EK☆41Updated 6 years ago
- ☆78Updated 2 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆77Updated 4 years ago
- Android Automation Tool☆20Updated 6 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 7 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Updated 7 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- Various scripts for different malware families☆104Updated 3 years ago
- A collection of infosec related scripts and information.☆53Updated 3 months ago
- A warehouse for your malware☆134Updated 11 years ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆150Updated 2 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆75Updated 6 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 5 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆117Updated 5 years ago
- ☆134Updated 5 years ago
- Past presentation materials☆10Updated 6 years ago