Fuzzy hashing API and fuzzy hashing tool
☆777Sep 13, 2025Updated 5 months ago
Alternatives and similar repositories for ssdeep
Users that are interested in ssdeep are comparing it to the libraries listed below
Sorting:
- Python wrapper for ssdeep fuzzy hashing library☆151Dec 21, 2021Updated 4 years ago
- ☆816Feb 17, 2026Updated 2 weeks ago
- similarity digest hashing tool☆177Oct 16, 2020Updated 5 years ago
- yarGen is a generator for YARA rules☆1,776Jan 10, 2026Updated last month
- Repository of yara rules☆4,722Apr 17, 2024Updated last year
- The pattern matching swiss knife☆9,439Feb 10, 2026Updated 2 weeks ago
- pefile is a Python module to read and work with PE (Portable Executable) files☆2,024Feb 23, 2026Updated last week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,897Feb 23, 2026Updated last week
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,269Updated this week
- A curated list of awesome YARA rules, tools, and people.☆4,146Updated this week
- Fuzzy Hash calculated from import API of PE files☆90Aug 26, 2022Updated 3 years ago
- A static analyzer for PE executables.☆1,107Updated this week
- YARA signature and IOC database for my scanners and tools☆2,874Feb 5, 2026Updated 3 weeks ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,295Feb 14, 2026Updated 2 weeks ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,922May 3, 2022Updated 3 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,562Oct 31, 2025Updated 4 months ago
- Malware Configuration And Payload Extraction☆3,031Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,844Updated this week
- Main Sigma Rule Repository☆10,145Feb 19, 2026Updated last week
- A VBA parser and emulation engine to analyze malicious macros.☆1,118Jul 10, 2024Updated last year
- C++ implementation of ssdeep-compatible fast fuzzy hashing☆37Jun 28, 2017Updated 8 years ago
- Export disassemblies into Protocol Buffers☆1,177Feb 2, 2026Updated last month
- Hyper-V Research is trendy now☆198May 6, 2024Updated last year
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,141Feb 23, 2026Updated last week
- DRAKVUF Black-box Binary Analysis☆1,209Updated this week
- Rekall Memory Forensic Framework☆1,997Oct 18, 2020Updated 5 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- An advanced memory forensics framework☆7,972May 16, 2025Updated 9 months ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Jun 8, 2019Updated 6 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,083Dec 9, 2025Updated 2 months ago
- Digging Deeper....☆3,784Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,378Dec 23, 2025Updated 2 months ago
- Indicators of Compromises (IOC) of our various investigations☆1,917Feb 20, 2026Updated last week
- A machine learning tool that ranks strings based on their relevance for malware analysis.☆752Jan 22, 2026Updated last month
- Defund the Police.☆13,472Jun 7, 2024Updated last year
- Sysmon configuration file template with default high-quality event tracing☆5,401Jul 3, 2024Updated last year
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,313Oct 31, 2025Updated 4 months ago
- Dynamic unpacker based on PE-sieve☆796Sep 13, 2025Updated 5 months ago