necst / automated-arancinoView external linksLinks
automated-arancino is a lightweight analysis framework to automate malware experiments.
☆16Apr 17, 2017Updated 8 years ago
Alternatives and similar repositories for automated-arancino
Users that are interested in automated-arancino are comparing it to the libraries listed below
Sorting:
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- Galois Format Analysis Workbench☆22Nov 30, 2023Updated 2 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Jul 25, 2021Updated 4 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Jan 15, 2019Updated 7 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- ☆108Jul 18, 2017Updated 8 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 5 months ago
- ☆11Feb 21, 2016Updated 9 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 5, 2026Updated last week
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆12Aug 1, 2025Updated 6 months ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- ☆10Aug 9, 2024Updated last year
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- PINTool to help analyzing malware that uses process injection☆15Jan 3, 2022Updated 4 years ago
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 8 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- A powerful prompt template engine built upon Jinja☆12Oct 22, 2025Updated 3 months ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆12Jun 6, 2024Updated last year
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Yara sort☆13Updated this week
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Publicly accessible version of the FiGHT website.☆16Nov 14, 2025Updated 3 months ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago