SaaSHub helps you find the best software and product alternatives Learn more →
Top 23 Python malware-research Projects
-
theZoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
-
pyWhat
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
malware-ioc
This repository contains indicators of compromise (IOCs) of our various investigations. (by prodaft)
-
pyhidra
Pyhidra is a Python library that provides direct access to the Ghidra API within a native CPython interpreter using jpype.
-
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
-
docker-packing-box
Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detection
-
bintropy
Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Project mention: PTI-257 Group Indicators of Compromise (IOCs) - PTI-257 consists of former Wizard Spider actors who are publicly known for the various malware variants they use (Ryuk, Trickbot, and Conti, among others) | /r/blueteamsec | 2023-09-14
I have Pyhidra installed, and I've followed the raw usage example on the GitHub page (https://github.com/dod-cyber-crime-center/pyhidra), However, my script doesn't recognize the libraries. What's going wrong?
Project mention: machofile: machofile is a module to parse Mach-O binary files | /r/blueteamsec | 2023-10-13
Python malware-research related posts
- PTI-257 Group Indicators of Compromise (IOCs) - PTI-257 consists of former Wizard Spider actors who are publicly known for the various malware variants they use (Ryuk, Trickbot, and Conti, among others)
- TheZoo a.k.a. Malware DB
- Tools to demonstrate malware or ransomware infected PC
- Worms for practice
- Python script which uses Ghidra doesn't recognize imports
- Decryptor for PlutoCrypt Ransomware
- Diablo I/II/III/IV/Immortal Class Randomizer
-
A note from our sponsor - SaaSHub
www.saashub.com | 25 Apr 2024
Index
What are some of the best open-source malware-research projects in Python? This list will help you:
Project | Stars | |
---|---|---|
1 | theZoo | 10,688 |
2 | pyWhat | 6,352 |
3 | CAPEv2 | 1,650 |
4 | yarGen | 1,447 |
5 | malboxes | 1,011 |
6 | drakvuf-sandbox | 983 |
7 | ThreatIngestor | 781 |
8 | iocextract | 485 |
9 | karton | 366 |
10 | mwdb-core | 292 |
11 | malware-ioc | 196 |
12 | pyhidra | 141 |
13 | pyc2bytecode | 127 |
14 | peid | 117 |
15 | teleRAT | 109 |
16 | aurora | 74 |
17 | Configuration_extractors | 45 |
18 | machofile | 43 |
19 | docker-packing-box | 42 |
20 | bintropy | 38 |
21 | IDAPython | 22 |
22 | pypackerdetect | 19 |
23 | ATLAS | 19 |
Sponsored