18 packages found

packj

Packj flags malicious and other "risky" RubyGems packages in your software supply chain.
  1. developer-tools
  2. devops
  3. devops-tools
  4. devsecops
  5. dynamic-analysis
  6. malware
  7. malware-analysis
  8. npm
  9. pypi
  10. python
  11. rubygems
  12. sandboxing
  13. security
  14. security-audit
  15. security-tools
  16. static-analysis
  17. supply-chain
  18. supply-chain-security
  19. vulnerability
  20. vulnerability-scanners
12 Contributors
0.0.0published 2 years agoMIT

assemblyline-core

Assemblyline 4 - Core components
  1. assemblyline
  2. automated
  3. malware
  4. analysis
  5. gc
  6. canada
  7. cse-cst
  8. cse
  9. cst
  10. cyber
  11. cccs
  12. components
  13. core
  14. malware-analysis
14 Contributors
4.5.0.79published 4 weeks agoMIT

plyara

Parse YARA rules
  1. malware
  2. analysis
  3. yara
  4. lex
  5. lexer
  6. parser
  7. ply
  8. python
  9. python3
  10. sly
  11. yacc
  12. yara-parser
  13. yara-rules
  14. yara-x
22 Contributors
2.2.8published 2 months agoApache-2.0

wordfence

Command-line malware scanner powered by Wordfence
  1. malware
  2. malware-scanner
  3. python
  4. vulnerabilities
  5. vulnerability-scanner
5.0.1published 5 months agoOther

mobsf

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
  1. mobsf
  2. mobile
  3. security
  4. framework
  5. tool
  6. static
  7. analysis
  8. dynamic
  9. malware
  10. android-security
  11. api-testing
  12. apk
  13. cwe
  14. devsecops
  15. dynamic-analysis
  16. ios-security
  17. malware-analysis
  18. mastg
  19. masvs
  20. mobile-security
  21. mstg
  22. owasp
  23. rest
  24. runtime-security
  25. static-analysis
  26. web-security
  27. windows-mobile-security
87 Contributors
4.3.2published 1 week agoGPL-3.0-only

ioc-finder

Python package for finding and parsing indicators of compromise from text.
  1. iocs
  2. indicators
  3. of
  4. compromise
  5. parsing
  6. finding
  7. searching
  8. threat
  9. intelligence
  10. malware
  11. hunting
  12. observables
  13. domains
  14. domain
  15. names
  16. asns
  17. cidr
  18. ranges
  19. ips
  20. ip
  21. addresses
  22. urls
  23. email
  24. md5
  25. sha1
  26. sha256
  27. google
  28. ads
  29. cve
  30. file
  31. paths
  32. cidr-range
  33. cidr-ranges
  34. grammar-parser
  35. grammars
  36. hacktoberfest
  37. indicators-of-compromise
  38. ioc-finder
  39. ipv4
  40. malware-analysis
  41. malware-research
  42. network-data
  43. observable
  44. parse-urls
  45. threat-hunting
  46. threat-intelligence
  47. threat-sharing
  48. threatintel
6 Contributors
7.3.0published 2 years agoLGPL-3.0

flare-capa

The FLARE team's open-source tool to identify capabilities in executable files.
  1. malware
  2. analysis
  3. reverse
  4. engineering
  5. capability
  6. detection
  7. software
  8. behaviors
  9. capa
  10. FLARE
  11. binary-analysis
  12. gsoc-2025
  13. malware-analysis
  14. reverse-engineering
  15. threat-intelligence
56 Contributors
9.1.0published 1 month agoOther

volatility3

Memory forensics framework
  1. volatility
  2. memory
  3. forensics
  4. framework
  5. windows
  6. linux
  7. volshell
  8. digital-investigation
  9. incident-response
  10. malware
  11. python
  12. ram
  13. volatility-framework
67 Contributors
2.11.0published 3 months agoOther

avclass-malicialab

AVClass is a Python package and command line tool to tag / label malware samples.
  1. malware
  2. family
  3. tag
  4. AV
  5. label
4 Contributors
2.8.10published 5 months agoOther

assemblyline

Assemblyline 4 - Automated malware analysis framework
  1. assemblyline
  2. automated
  3. malware
  4. analysis
  5. gc
  6. canada
  7. cse-cst
  8. cse
  9. cst
  10. cyber
  11. cccs
  12. malware-analysis
27 Contributors
4.5.0.79published 4 weeks agoMIT
Showing 1 to 10 of 18 results