Name | Version | Summary | date |
assemblyline-core |
4.5.0.67 |
Assemblyline 4 - Core components |
2024-12-17 19:56:43 |
assemblyline |
4.5.0.67 |
Assemblyline 4 - Automated malware analysis framework |
2024-12-17 19:56:37 |
assemblyline-v4-service |
4.5.0.67 |
Assemblyline 4 - Service base |
2024-12-17 19:56:32 |
assemblyline-ui |
4.5.0.67 |
Assemblyline 4 - API and Socket IO server |
2024-12-17 19:56:26 |
assemblyline-service-server |
4.5.0.67 |
Assemblyline 4 - Service Server |
2024-12-17 19:56:21 |
assemblyline-service-client |
4.5.0.67 |
Assemblyline 4 - Service client |
2024-12-17 19:56:16 |
plyara |
2.2.2 |
Parse YARA rules |
2024-12-12 04:10:40 |
assemblyline-service-utilities |
4.5.1.0 |
Assemblyline 4 - Service Utilities |
2024-12-11 16:19:09 |
multidecoder |
1.6.2 |
A context preserving IOC extraction library |
2024-12-04 20:33:21 |
avclass-malicialab |
2.8.9 |
AVClass is a Python package and command line tool to tag / label malware samples. |
2024-09-05 13:10:00 |
pyintelowl |
5.0.2 |
Robust Python SDK and CLI for IntelOwl's API |
2024-08-29 09:28:46 |
kasperskytip |
1.0 |
Kaspersky TIP unofficial API for Python |
2024-08-26 21:36:41 |
pythreatmatrix |
5.0.0 |
Robust Python SDK and CLI for ThreatMatrix's API |
2024-07-01 04:31:04 |
intelxpy |
5.0.0 |
Robust Python SDK and CLI for IntelX's API |
2024-06-30 23:13:03 |
rugosa |
1.0.0 |
The next generation of kordesii. This is a library for managing emulation and provides utilities for interfacing with decompiled malware samples using dragodis. |
2024-06-17 18:50:42 |
dragodis |
1.0.0 |
A universal interface for running scripts under multiple disassemblers. |
2024-06-17 18:50:18 |
mwcp |
3.14.0 |
A framework for malware configuration parsers. |
2024-06-06 13:40:54 |
droidlysis |
3.4.7 |
DroidLysis: pre-analysis of suspicious Android samples |
2024-04-12 11:29:14 |
Triple |
1.1.2 |
Triple Server Agent |
2024-02-19 08:14:15 |
cy-ioc-finder |
7.2.13 |
Python package for finding and parsing indicators of compromise from text. |
2024-02-02 13:38:51 |