sporksmith / polygraphLinks
☆14Updated 9 years ago
Alternatives and similar repositories for polygraph
Users that are interested in polygraph are comparing it to the libraries listed below
Sorting:
- A system to record malware using PANDA☆44Updated 6 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 11 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 8 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆146Updated 3 years ago
- Investigation Planner for fast running analysis with predictable execution time. For example, static analysis.☆29Updated 6 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- A Cuckoo Sandbox Extension for Android☆76Updated 10 years ago
- ☆12Updated 8 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Updated 7 years ago
- ☆93Updated 6 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Memory forensics of virtualization environments☆47Updated 10 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Updated 11 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Updated 9 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆31Updated 8 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆190Updated 9 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- ☆38Updated 12 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 9 years ago
- a collection of public yara rules☆26Updated 5 years ago
- PGT allows you to generate pcaps using python without touching the network in any way. It is dependent upon scapy.☆29Updated 3 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- A Libemu Cython wrapper☆126Updated last year
- Patching Flash binary to stop Flash exploits and zero-days☆62Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 9 years ago
- Creates fuzzing inputs for command line programs using help options and man pages.☆28Updated 10 years ago