netspooky / inhaleView external linksLinks
A malware analysis and classification tool.
☆190Dec 3, 2021Updated 4 years ago
Alternatives and similar repositories for inhale
Users that are interested in inhale are comparing it to the libraries listed below
Sorting:
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Intro to Assembly Optimization stream repo☆30Nov 22, 2021Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Jan 13, 2022Updated 4 years ago
- Malware/IOC ingestion and processing engine☆109Nov 20, 2018Updated 7 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Scanning pastebin with yara rules☆1,126Jan 10, 2026Updated last month
- A machine learning tool that ranks strings based on their relevance for malware analysis.☆750Jan 22, 2026Updated 3 weeks ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,263Updated this week
- ☆15May 26, 2021Updated 4 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- An open source script to perform malware static analysis on Portable Executable☆329May 23, 2023Updated 2 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆301Dec 27, 2023Updated 2 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Apr 15, 2019Updated 6 years ago
- Elemental - An ATT&CK Threat Library☆320Dec 8, 2022Updated 3 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆278Nov 3, 2019Updated 6 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- A very fast and smart web directory and file enumeration tool written in C.☆141Sep 15, 2025Updated 4 months ago
- A tool for malicious behavior detection in IoT devices☆77Nov 24, 2018Updated 7 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Mar 12, 2020Updated 5 years ago
- A static analyzer for PE executables.☆1,103Jan 30, 2026Updated 2 weeks ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆84Updated this week
- Endpoint detection & Malware analysis software☆229Dec 20, 2019Updated 6 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆679Oct 28, 2023Updated 2 years ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,531Jan 20, 2026Updated 3 weeks ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Oct 17, 2023Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 4 months ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Aug 23, 2021Updated 4 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆112Mar 25, 2021Updated 4 years ago
- ☆54Sep 6, 2020Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago