PeaceMaker
Malware detector
A Windows kernel-mode utility designed to detect and analyze advanced malware techniques.
PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.
417 stars
27 watching
105 forks
Language: C++
last commit: almost 5 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| An executable detection tool using PE parsing and machine learning signatures to identify packed samples. | 30 |
| An experimental tool designed to detect and unpack malware implants injected via process hollowing or generic packer routines. | 129 |
| An automated tool for analyzing .NET-based malware samples by logging function calls and dumping memory segments. | 250 |
| A command-line tool for analyzing malware and disassembling binary files | 386 |
| A real-time detection software for Windows process injections | 291 |
| A Python-based tool for parsing and analyzing Windows Defender's DetectionHistory forensic artifact. | 110 |
| An implementation of MalConv for malware detection using PyTorch | 71 |
| Analyzes and enriches threat intelligence data from various sources to help detect malicious files, URLs, and domains. | 39 |
| An extension for Burp Suite to automatically search for sensitive strings in HTTP messages | 44 |
| Automated detection of malicious persistence techniques in Windows machines. | 1,930 |
| Automated malware scanning tool for containers and filesystems using YARA ruleset | 1,275 |
| Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. | 77 |
| A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 377 |
| Automated platform for discovering and analyzing cybersecurity threats targeting an organization | 869 |
| Scans for and identifies malicious system modifications | 704 |