waja / maldetectView external linksLinks
Debian packaging of Linux Malware Detect (https://github.com/rfxn/linux-malware-detect)
☆59Aug 19, 2025Updated 5 months ago
Alternatives and similar repositories for maldetect
Users that are interested in maldetect are comparing it to the libraries listed below
Sorting:
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Linux Malware Detection (LMD)☆1,368Feb 26, 2025Updated 11 months ago
- Dockerized Cuckoo build☆10Aug 3, 2016Updated 9 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- SpamAssassin module☆13Nov 20, 2014Updated 11 years ago
- The System Administrators Guide to Virtual Disk Operations☆20Feb 26, 2020Updated 5 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 6 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 10 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Sep 19, 2016Updated 9 years ago
- Good-enough Hex Editor/Annotator☆24May 3, 2020Updated 5 years ago
- Injected malicious code into legitimate andoid applications. Converted a keyboard app into a keylogger and an MP3 downloader into an imag…☆19Aug 8, 2014Updated 11 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 9 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- A framework for implementing the page object pattern and automating web page interactions☆12Dec 1, 2017Updated 8 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Apr 1, 2022Updated 3 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆82Updated this week
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 6 years ago
- A fast bencode implementation in Cython☆33Oct 24, 2025Updated 3 months ago
- Lazy man's, user-mode union file system☆31Aug 21, 2015Updated 10 years ago
- ☆10Mar 10, 2023Updated 2 years ago
- Simulation of ASK (Amplitude Shift Keying) and PSK (Phase Shift Keying) modulation and demodulation in Labcenter Proteus.☆10Oct 30, 2018Updated 7 years ago
- Simple faucet Ready out of box for ePay.info☆11May 31, 2017Updated 8 years ago
- Document management system on the blockchain with clever ACL and automatic declassification of documents☆12Feb 16, 2016Updated 9 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- old C version of package and build manager for sabotage linux, current version is written in shell/awk and can be found in KEEP/bin in th…☆36Jun 22, 2019Updated 6 years ago
- Dependency Injection framework to configure a PSR-11 Container with Attributes!☆41Jan 27, 2026Updated 2 weeks ago