rieck / malheurLinks
A Tool for Automatic Analysis of Malware Behavior
☆372Updated 6 years ago
Alternatives and similar repositories for malheur
Users that are interested in malheur are comparing it to the libraries listed below
Sorting:
- Repository of modules and signatures contributed by the community☆328Updated 2 years ago
- Modified edition of cuckoo☆270Updated 5 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆397Updated 9 years ago
- The Multiplatform Linux Sandbox☆263Updated 3 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆613Updated 2 years ago
- Modified edition of cuckoo☆401Updated 7 years ago
- Automatic Yara Rule Generation☆334Updated 9 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆206Updated 11 years ago
- Set of tools for interacting with Malshare☆156Updated 5 years ago
- Collaborative malware analysis framework☆375Updated 6 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆146Updated 3 years ago
- A Tool To Leverage Virus Total's Private API Key☆237Updated 4 years ago
- VirusTotal Full api☆298Updated 2 years ago
- The new Cuckoo Monitor.☆344Updated last year
- Official repository for Pyew.☆392Updated 5 years ago
- Protocol Analysis/Decoder Framework☆494Updated 2 years ago
- Cuckoo Sandbox Dockerfile☆328Updated 5 years ago
- BASS - BASS Automated Signature Synthesizer☆176Updated 6 years ago
- Malware static analysis framework☆178Updated 5 years ago
- Malware Configuration And Payload Extraction☆760Updated 7 months ago
- Various snippets created during malware analysis☆455Updated 2 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆499Updated last year
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆155Updated 5 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆190Updated 9 years ago
- Code written as part of our various malware investigations☆398Updated 6 months ago
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- The pattern matching swiss knife☆139Updated 5 years ago
- Yara rules for malware families seen as part of targeted threats project☆138Updated 8 years ago