☆826Feb 17, 2026Updated 2 months ago
Alternatives and similar repositories for tlsh
Users that are interested in tlsh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- similarity digest hashing tool☆177Oct 16, 2020Updated 5 years ago
- Symbol hash for ELF files☆117Feb 9, 2022Updated 4 years ago
- Fuzzy hashing API and fuzzy hashing tool☆791Sep 13, 2025Updated 7 months ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Generating YARA rules based on binary code☆221Oct 7, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- A static analyzer for PE executables.☆1,122Mar 11, 2026Updated last month
- Kaspersky's GReAT KLara☆733Jul 24, 2024Updated last year
- Approximate matching using Hierarchical Bloom Filter Trees. Based on mrsh-v2.☆14Feb 20, 2021Updated 5 years ago
- yarGen is a generator for YARA rules☆1,786Jan 10, 2026Updated 3 months ago
- ☆98Oct 7, 2020Updated 5 years ago
- Fuzzy Hash calculated from import API of PE files☆90Aug 26, 2022Updated 3 years ago
- ☆55Sep 14, 2018Updated 7 years ago
- Repository of yara rules☆4,770Apr 17, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automatically generate AV byte signatures from sets of similar binaries.☆286Apr 24, 2026Updated last week
- YARA signature and IOC database for my scanners and tools☆2,931Updated this week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,982Apr 23, 2026Updated last week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,982Updated this week
- An Open Source Malware Analysis Pipeline System☆158Jun 1, 2021Updated 4 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated 3 months ago
- Indicators of Compromises (IOC) of our various investigations☆1,946Apr 23, 2026Updated last week
- AVClass malware labeling tool☆486Oct 22, 2024Updated last year
- Python implementation of the LZJD algorithm☆33Jul 10, 2025Updated 9 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- DRAKVUF Black-box Binary Analysis☆1,232Mar 5, 2026Updated last month
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- A curated list of awesome YARA rules, tools, and people.☆4,189Mar 16, 2026Updated last month
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated 3 months ago
- ssdeep for python on windows☆20Feb 7, 2026Updated 2 months ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆548May 1, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆281Mar 1, 2023Updated 3 years ago
- Collection of rules created using YARA-Signator over Malpedia☆143Jan 6, 2026Updated 3 months ago
- Security ML models encoded as Yara rules☆214Jul 6, 2023Updated 2 years ago
- Collaborative malware analysis framework☆382Jan 22, 2019Updated 7 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 8 months ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- ETW Python Library☆299Aug 11, 2023Updated 2 years ago