zom3y3 / ssdcView external linksLinks
ssdeep cluster analysis for malware files
☆31Jun 5, 2020Updated 5 years ago
Alternatives and similar repositories for ssdc
Users that are interested in ssdc are comparing it to the libraries listed below
Sorting:
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆120Apr 30, 2019Updated 6 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Nov 19, 2019Updated 6 years ago
- ☆10Jan 21, 2022Updated 4 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Updated this week
- ☆11Nov 28, 2016Updated 9 years ago
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- Deep learning malware detection system using the EMBER dataset☆11Nov 22, 2024Updated last year
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Jan 5, 2019Updated 7 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Jan 14, 2026Updated last month
- parse strace log☆12Oct 16, 2019Updated 6 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Generating YARA rules based on binary code☆220Oct 7, 2021Updated 4 years ago
- scripts/plugins for IDA Pro☆177Jan 10, 2025Updated last year
- Bypass cobaltstrike beacon config scan☆84May 24, 2021Updated 4 years ago
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Jan 8, 2020Updated 6 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Dec 7, 2019Updated 6 years ago
- ssdeep for python on windows☆18Feb 7, 2026Updated last week
- NextB的基于敏感哈希的恶意文件相似度比较工具(python版本)☆13Jan 20, 2022Updated 4 years ago
- Some tools to monitor BillGates CnC servers☆137Apr 14, 2014Updated 11 years ago
- Good Stuff from Dark Web☆37Sep 3, 2024Updated last year
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- ☆15Feb 22, 2021Updated 4 years ago
- Scalable security network sensor as low interaction honeypot☆17Oct 25, 2023Updated 2 years ago