Malware Configuration And Payload Extraction
-
Updated
Nov 14, 2024 - Python
Malware Configuration And Payload Extraction
Parse, Audit, Query, Build, and Modify Arista / Cisco / Juniper / Palo Alto / F5 configurations.
Grabb Xray Configs Like a Neko
derpconf abstracts loading configuration files for your app.
Forget about configparser, YAML, or JSON parsers. Focus on configuration. NOT RECOMMENDED FOR USE (2019-01-26)
Superloop is a network automation framework, used to manage networks at scale. It's a framework that auto remediates based on templates and maintains config standardization across device platforms. As well, it comes equipped with various toolsets that assist Network Engineers with their day to day tasks.
A lightweight and extensible toolbox for image classification
Assemblyline 4 Malware detonation service (CAPEv2)
This is a python implementation for an application similar to zookeeper. It keeps your config data in once place and can be updated WUTHOUT a change in code. It is made for distributed systems and can be used in applications like machine learning and web apps.
Configuration framework that helps you create flexible configs for your python apps
Multi-file Configurations for Python Applications
cluster setup helpers
Add a description, image, and links to the configs topic page so that developers can more easily learn about it.
To associate your repository with the configs topic, visit your repo's landing page and select "manage topics."