StringSifter Logo

StringSifter

0
Free
Visit Website

StringSifter is a machine learning tool that automatically ranks strings based on their relevance for malware analysis. Quick Links: - Technical Blogpost - Learning to Rank Strings Output for Speedier Malware Analysis - Announcement Blogpost - Open Sourcing StringSifter - DerbyCon Talk - StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis StringSifter releases on PyPi. Usage: StringSifter requires Python version 3.9 or newer. Installation: - pip install stringsifter - For development, use poetry: git clone https://github.com/mandiant/stringsifter.git cd stringsifter poetry install --with dev Running Unit Tests: To run unit tests from the StringSifter installation directory: poetry run tests -v Running from the Command Line: The pip install command installs two runnable scripts flarestrings and rank_strings into your python environment. When developing from source, use pipenv run flarestrings and pipenv run rank_strings. flarestrings mimics features of GNU binutils' strings, and rank_strings accepts piped input, for example: flarestrings <my_sample> | rank_strings rank_strings supports a number of

FEATURES

ALTERNATIVES

Detect and warn about potential malicious behaviors in Android applications through static analysis.

A next-generation file integrity monitoring and change detection system

An open-source phishing toolkit for businesses and penetration testers.

MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.

An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.

GridPot is a cybersecurity tool that integrates GridLAB-D, Conpot, and libiec61850 to simulate and detect attacks on industrial control systems (ICS).

Altoro Mutual offers online banking, real estate financing, business credit cards, retirement solutions, and prioritizes privacy and security.

Tools and documentation for validating hardware security requirements on x86 platforms, including bootable USB key creation and platform configuration verification.