Name | Version | Summary | date |
CAPE-parsers |
0.1.20 |
CAPE: Malware Configuration Extraction |
2025-01-08 15:10:49 |
rat-king-parser |
4.0.1 |
A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno RAT, and cloned/derivative RAT families. |
2024-12-30 04:07:57 |
yara-x |
0.12.0 |
Python bindings for YARA-X |
2024-12-17 12:25:34 |
yaralyzer |
0.9.6 |
Visualize and force decode YARA and regex matches found in a file or byte stream. With colors. Lots of colors. |
2024-12-14 07:50:34 |
gdetect |
0.8.0 |
Library and CLI for GLIMPS Detect API |
2024-11-18 14:42:49 |
mail-parser |
4.1.2 |
Improved wrapper for email standard library |
2024-11-11 21:40:51 |
viriback2misp |
0.3 |
Upload Viriback C2 Track data to MISP events |
2024-11-08 20:28:26 |
pdfalyzer |
1.16.1 |
A PDF analysis toolkit. Scan a PDF with relevant YARA rules, visualize its inner tree-like data structure in living color (lots of colors), force decodes of suspicious font binaries, and more. |
2024-10-26 21:12:21 |
anyrun-tg-bot |
0.6.4 |
A Telegram bot for interacting with the ANY.RUN API |
2024-10-14 18:15:56 |
flare-floss |
3.1.1 |
FLARE Obfuscated String Solver |
2024-09-26 13:14:14 |
kavanoz |
0.0.4 |
Unpacking framework for common android malware |
2024-09-26 12:52:45 |
ThreatHunter |
1.1.4 |
None |
2024-06-29 12:53:41 |
ezyara |
0.4.1 |
Python bindings for YARA-X |
2024-06-18 01:36:45 |
IoTNetworkMalwareClassifier |
0.0.20 |
🛡️ The IoT Network Malware Classifier 🚀 is an advanced solution tackling security concerns in IoT, employing deep learning for precise malware detection in network traffic. |
2024-05-04 10:47:57 |
mvt |
2.5.3 |
Mobile Verification Toolkit |
2024-04-19 15:31:40 |