File analysis and management framework.
☆93Sep 6, 2023Updated 2 years ago
Alternatives and similar repositories for viper2
Users that are interested in viper2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- Rust port of TLSH☆14Oct 12, 2025Updated 6 months ago
- C2 Active Scanner☆58Jun 19, 2024Updated last year
- Assorted classes and methods for indexing reports and retrieving information from an elastic index☆21Jul 5, 2016Updated 9 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 3 months ago
- Collection of rules created using YARA-Signator over Malpedia☆143Jan 6, 2026Updated 4 months ago
- Binary analysis and management framework☆1,561Jun 7, 2023Updated 2 years ago
- ☆23Jun 11, 2024Updated last year
- Repository of Yara Rules☆143Apr 29, 2026Updated last week
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆99Jan 13, 2026Updated 3 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆470Apr 9, 2026Updated 3 weeks ago
- AppLocker Policy Generator☆26Aug 25, 2025Updated 8 months ago
- Malware Configuration And Payload Extraction☆3,165Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Hatching Triage public command-line utility and API library.☆75Oct 9, 2023Updated 2 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 3 years ago
- Detection Engineering with YARA☆87Jan 6, 2024Updated 2 years ago
- because twin clams are better than one clam?☆29Apr 27, 2026Updated last week
- PKWARE Data Compression decompressor tool and library☆17Dec 31, 2020Updated 5 years ago
- UnpacMe IDA Byte Search☆28Nov 20, 2023Updated 2 years ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆809Apr 8, 2026Updated 3 weeks ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Apr 14, 2026Updated 3 weeks ago
- Antivirus Emulator Fingerprints☆30Oct 12, 2018Updated 7 years ago
- Dataset of packed PE samples☆44Jan 24, 2026Updated 3 months ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆158Jan 25, 2026Updated 3 months ago
- GDB enhanced to debug wine processes☆16Jul 31, 2022Updated 3 years ago
- Convert native dll to shellcode, and support exported function☆25Feb 10, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Yara rules for malware families seen as part of targeted threats project☆142Nov 17, 2016Updated 9 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Mar 7, 2023Updated 3 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- A Python implementation of the Community ID flow hashing standard☆24Nov 29, 2023Updated 2 years ago
- Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.☆16Nov 24, 2025Updated 5 months ago
- Wrappers to tmux commands, usefull for tmux based automation☆16Mar 11, 2022Updated 4 years ago
- Malware Control Monitor☆89Mar 2, 2015Updated 11 years ago