☆22Apr 10, 2020Updated 5 years ago
Alternatives and similar repositories for viper-docker
Users that are interested in viper-docker are comparing it to the libraries listed below
Sorting:
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Sep 27, 2015Updated 10 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆22Apr 15, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- Docker container for MISP☆96Jun 20, 2018Updated 7 years ago
- The JSidle Javascript packer☆23Sep 16, 2010Updated 15 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Aug 4, 2016Updated 9 years ago
- ☆14May 18, 2022Updated 3 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Jun 5, 2017Updated 8 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 3 years ago
- A PowerShell module to abstract the complexities of Permanent WMI Event Subscriptions☆55Feb 23, 2016Updated 10 years ago
- Public version of PDF X-RAY☆59Apr 9, 2012Updated 13 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Binary analysis and management framework☆1,556Jun 7, 2023Updated 2 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Automated malware unpacker☆121Mar 5, 2016Updated 10 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- ☆18Mar 26, 2025Updated 11 months ago
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 7 years ago
- Yara Dockerfile☆50Oct 3, 2022Updated 3 years ago
- ☆13Nov 8, 2017Updated 8 years ago
- Malice VirusTotal Plugin☆12Feb 24, 2019Updated 7 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Aug 7, 2015Updated 10 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Read TextMate syntax files and parse text with them☆17Jan 12, 2015Updated 11 years ago