Name | Version | Summary | date |
assemblyline-core |
4.6.0.8 |
Assemblyline 4 - Core components |
2025-07-04 17:25:24 |
assemblyline |
4.6.0.8 |
Assemblyline 4 - Automated malware analysis framework |
2025-07-04 17:25:20 |
assemblyline-v4-service |
4.6.0.8 |
Assemblyline 4 - Service base |
2025-07-04 17:25:18 |
assemblyline-ui |
4.6.0.8 |
Assemblyline 4 - API and Socket IO server |
2025-07-04 17:25:14 |
assemblyline-service-server |
4.6.0.8 |
Assemblyline 4 - Service Server |
2025-07-04 17:25:11 |
assemblyline-service-client |
4.6.0.8 |
Assemblyline 4 - Service client |
2025-07-04 17:25:08 |
assemblyline-service-utilities |
4.5.1.1 |
Assemblyline 4 - Service Utilities |
2025-02-13 15:29:15 |
pymalwaremk |
0.2 |
A python package to make malware creation easier |
2025-02-09 15:18:03 |
plyara |
2.2.8 |
Parse YARA rules |
2025-02-06 21:06:24 |
multidecoder |
1.6.3 |
A context preserving IOC extraction library |
2025-01-15 20:59:33 |
avclass-malicialab |
2.8.9 |
AVClass is a Python package and command line tool to tag / label malware samples. |
2024-09-05 13:10:00 |
pyintelowl |
5.0.2 |
Robust Python SDK and CLI for IntelOwl's API |
2024-08-29 09:28:46 |
kasperskytip |
1.0 |
Kaspersky TIP unofficial API for Python |
2024-08-26 21:36:41 |
pythreatmatrix |
5.0.0 |
Robust Python SDK and CLI for ThreatMatrix's API |
2024-07-01 04:31:04 |
intelxpy |
5.0.0 |
Robust Python SDK and CLI for IntelX's API |
2024-06-30 23:13:03 |
rugosa |
1.0.0 |
The next generation of kordesii. This is a library for managing emulation and provides utilities for interfacing with decompiled malware samples using dragodis. |
2024-06-17 18:50:42 |
dragodis |
1.0.0 |
A universal interface for running scripts under multiple disassemblers. |
2024-06-17 18:50:18 |
mwcp |
3.14.0 |
A framework for malware configuration parsers. |
2024-06-06 13:40:54 |
droidlysis |
3.4.7 |
DroidLysis: pre-analysis of suspicious Android samples |
2024-04-12 11:29:14 |
Triple |
1.1.2 |
Triple Server Agent |
2024-02-19 08:14:15 |