threatcat-ch / malware-analysis-pipelineView external linksLinks
Lightweight Python-Based Malware Analysis Pipeline
☆38Dec 9, 2025Updated 2 months ago
Alternatives and similar repositories for malware-analysis-pipeline
Users that are interested in malware-analysis-pipeline are comparing it to the libraries listed below
Sorting:
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- ☆10Apr 10, 2024Updated last year
- Converting data from services like Censys and Shodan to a common data model☆51Updated this week
- ☆24Sep 28, 2022Updated 3 years ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- Side channel-based network measurement tools.☆15Sep 1, 2015Updated 10 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Mar 15, 2024Updated last year
- ☆32Aug 5, 2022Updated 3 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- A mapping of used malware names to commonly known family names☆62Feb 21, 2023Updated 2 years ago
- eBPF-based EDR for Linux☆18Aug 25, 2024Updated last year
- Plugin packages that provide custom visualizations and analytics capabilities to Trisul Network Analytics.☆17Jan 27, 2026Updated 2 weeks ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 2 months ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Aug 17, 2022Updated 3 years ago
- Using open Adb ports we can exploit a Andriod Device☆19Jun 30, 2019Updated 6 years ago
- ☆21Apr 19, 2024Updated last year
- ☆16Updated this week
- URL fingerprinting made easy☆90Apr 13, 2024Updated last year
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Process hiding library☆19Feb 23, 2020Updated 5 years ago
- Base45☆22Apr 30, 2024Updated last year
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Apr 22, 2021Updated 4 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- privilege escalation POCs built in Rust.☆19Jun 30, 2022Updated 3 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102May 13, 2022Updated 3 years ago
- A Python implementation of the Community ID flow hashing standard☆24Nov 29, 2023Updated 2 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆25Oct 20, 2022Updated 3 years ago