rieck / harry
A Tool for Measuring String Similarity
☆116Updated 6 years ago
Alternatives and similar repositories for harry
Users that are interested in harry are comparing it to the libraries listed below
Sorting:
- A Tool for Embedding Strings in Vector Spaces☆58Updated 6 years ago
- A Content Anomaly Detector based on n-Grams☆23Updated 8 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Virus names generator☆28Updated 10 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- Fast multipattern regular expression searching for digital forensics☆17Updated 5 years ago
- ☆12Updated 7 years ago
- Simple NGram Fast Indexer & Searcher☆37Updated 2 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 7 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- ☆75Updated 8 years ago
- Graphical analysis of PDF structure.☆12Updated 8 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Updated 9 years ago
- MITIE: library and tools for information extraction☆29Updated 10 years ago
- Realtime and Online Model Development Framework☆27Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Updated 10 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Fast ssdeep comparison library☆13Updated 10 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 4 years ago
- Builds json representation of PDF malware sample☆52Updated 14 years ago
- "Fuzzy matching" for SQLite databases☆29Updated 4 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- threat language parser☆60Updated 10 years ago
- Parse Yara rules and operate over them more easily.☆52Updated 6 years ago
- Locality-sensitive hashing algorithm for text similarity comparisons☆58Updated last month
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆190Updated 9 years ago