File analysis and management framework.
☆92Sep 6, 2023Updated 2 years ago
Alternatives and similar repositories for viper2
Users that are interested in viper2 are comparing it to the libraries listed below
Sorting:
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- Rust port of TLSH☆14Oct 12, 2025Updated 5 months ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- Assorted classes and methods for indexing reports and retrieving information from an elastic index☆21Jul 5, 2016Updated 9 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Collection of rules created using YARA-Signator over Malpedia☆142Jan 6, 2026Updated 2 months ago
- Binary analysis and management framework☆1,556Jun 7, 2023Updated 2 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 4 years ago
- ☆23Jun 11, 2024Updated last year
- Repository of Yara Rules☆141Updated this week
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆97Jan 13, 2026Updated 2 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆465Updated this week
- AppLocker Policy Generator☆26Aug 25, 2025Updated 6 months ago
- Malware Configuration And Payload Extraction☆3,082Updated this week
- Hatching Triage public command-line utility and API library.☆75Oct 9, 2023Updated 2 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- A Python 3 upgrade to Peepdf☆41Updated this week
- 🐍 High-performance, multi-threaded YARA & IOC scanner☆280Updated this week
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 2 years ago
- Detection Engineering with YARA☆87Jan 6, 2024Updated 2 years ago
- because twin clams are better than one clam?☆29Jan 30, 2026Updated last month
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆807Feb 5, 2026Updated last month
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆119Apr 8, 2023Updated 2 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Feb 22, 2026Updated 3 weeks ago
- Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.☆15Nov 24, 2025Updated 3 months ago
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated last week
- A collection of PoCs to do common things in unconventional ways☆121Aug 31, 2025Updated 6 months ago
- Dataset of packed PE samples☆43Jan 24, 2026Updated last month
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- GDB enhanced to debug wine processes☆16Jul 31, 2022Updated 3 years ago
- Convert native dll to shellcode, and support exported function☆25Feb 10, 2021Updated 5 years ago
- Yara rules for malware families seen as part of targeted threats project☆141Nov 17, 2016Updated 9 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Malware Control Monitor☆88Mar 2, 2015Updated 11 years ago