File analysis and management framework.
☆92Sep 6, 2023Updated 2 years ago
Alternatives and similar repositories for viper2
Users that are interested in viper2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rust port of TLSH☆14Oct 12, 2025Updated 5 months ago
- C2 Active Scanner☆57Jun 19, 2024Updated last year
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- Assorted classes and methods for indexing reports and retrieving information from an elastic index☆21Jul 5, 2016Updated 9 years ago
- Dataset of packed ELF samples☆20Jan 24, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Collection of rules created using YARA-Signator over Malpedia☆143Jan 6, 2026Updated 3 months ago
- Binary analysis and management framework☆1,556Jun 7, 2023Updated 2 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- ☆23Jun 11, 2024Updated last year
- Repository of Yara Rules☆141Mar 16, 2026Updated 3 weeks ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆97Jan 13, 2026Updated 2 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆466Mar 24, 2026Updated 2 weeks ago
- AppLocker Policy Generator☆26Aug 25, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Malware Configuration And Payload Extraction☆3,117Updated this week
- Hatching Triage public command-line utility and API library.☆75Oct 9, 2023Updated 2 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- 🐍 High-performance, multi-threaded YARA & IOC scanner☆301Mar 30, 2026Updated last week
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 3 years ago
- Detection Engineering with YARA☆87Jan 6, 2024Updated 2 years ago
- because twin clams are better than one clam?☆29Mar 30, 2026Updated last week
- PKWARE Data Compression decompressor tool and library☆17Dec 31, 2020Updated 5 years ago
- UnpacMe IDA Byte Search☆28Nov 20, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆808Updated this week
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆119Apr 8, 2023Updated 3 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Mar 30, 2026Updated last week
- THOR APT Scanner User Manual☆20Mar 31, 2026Updated last week
- Dataset of packed PE samples☆43Jan 24, 2026Updated 2 months ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆152Jan 25, 2026Updated 2 months ago
- GDB enhanced to debug wine processes☆16Jul 31, 2022Updated 3 years ago
- Yara rules for malware families seen as part of targeted threats project☆143Nov 17, 2016Updated 9 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- A Python implementation of the Community ID flow hashing standard☆24Nov 29, 2023Updated 2 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Malware Control Monitor☆88Mar 2, 2015Updated 11 years ago