Malcom - Malware Communications Analyzer
☆1,169Nov 29, 2017Updated 8 years ago
Alternatives and similar repositories for malcom
Users that are interested in malcom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Your Everyday Threat Intelligence☆1,967Updated this week
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆440Feb 24, 2023Updated 3 years ago
- FAME Automates Malware Evaluation☆934Dec 16, 2025Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,256Mar 26, 2026Updated 2 weeks ago
- Binary analysis and management framework☆1,556Jun 7, 2023Updated 2 years ago
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 3 years ago
- CRITs - Collaborative Research Into Threats☆910Jul 29, 2019Updated 6 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- ☆520Jan 26, 2021Updated 5 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,343Dec 13, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A static analyzer for PE executables.☆1,117Mar 11, 2026Updated 3 weeks ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,043Aug 23, 2021Updated 4 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆557May 9, 2023Updated 2 years ago
- Fast Incident Response☆2,002Updated this week
- A Tool for Automatic Analysis of Malware Behavior☆374May 8, 2019Updated 6 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,854Apr 3, 2023Updated 3 years ago
- yarGen is a generator for YARA rules☆1,783Jan 10, 2026Updated 2 months ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,221Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,959Apr 2, 2026Updated last week
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,365Updated this week
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Web App for Volatility framework☆386Jan 13, 2026Updated 2 months ago
- Kaspersky's GReAT KLara☆733Jul 24, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 2 months ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- Loki - Simple IOC and YARA Scanner☆3,742Jan 12, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆400May 20, 2016Updated 9 years ago
- Defund the Police.☆13,587Jun 7, 2024Updated last year
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- Malicious traffic detection system☆8,371Updated this week
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆280Mar 1, 2023Updated 3 years ago
- ☆305May 28, 2017Updated 8 years ago