rieck / malheurLinks
A Tool for Automatic Analysis of Malware Behavior
☆372Updated 6 years ago
Alternatives and similar repositories for malheur
Users that are interested in malheur are comparing it to the libraries listed below
Sorting:
- Modified edition of cuckoo☆270Updated 6 years ago
- Repository of modules and signatures contributed by the community☆329Updated 2 years ago
- Modified edition of cuckoo☆403Updated 7 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398Updated 9 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆615Updated 3 years ago
- Automatic Yara Rule Generation☆333Updated 9 years ago
- The Multiplatform Linux Sandbox☆265Updated 3 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆148Updated 3 years ago
- Set of tools for interacting with Malshare☆158Updated 5 years ago
- Collaborative malware analysis framework☆377Updated 6 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 8 years ago
- VirusTotal Full api☆303Updated 2 years ago
- A Tool To Leverage Virus Total's Private API Key☆241Updated 5 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆206Updated 11 years ago
- Cuckoo Sandbox Dockerfile☆331Updated 5 years ago
- BASS - BASS Automated Signature Synthesizer☆178Updated 7 years ago
- Protocol Analysis/Decoder Framework☆496Updated 2 years ago
- The new Cuckoo Monitor.☆347Updated last year
- Official repository for Pyew.☆391Updated 6 years ago
- Malware static analysis framework☆180Updated 5 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆155Updated 5 years ago
- Various snippets created during malware analysis☆459Updated 3 weeks ago
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 8 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆190Updated 9 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆509Updated last year
- Automated malware unpacker☆120Updated 9 years ago
- Code written as part of our various malware investigations☆404Updated 9 months ago
- The pattern matching swiss knife☆140Updated 5 years ago