Skip to content
Maltese - Malware Traffic Emulator
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
client
docs
.gitignore
LICENSE.txt
README.md

README.md

Maltese (Malware Traffic Emulating Software)

Maltese is a tool that is used to emulate malicious traffic generated by a given malware.

Developed using Python 3.4.3

##Maltese Command line options ####Root commands

usage: maltese.py [-h] {dga,replay} ...

optional arguments:
  -h, --help    show this help message and exit

commands:
  {dga,replay}
    dga         Execute DGA plugins
    replay      Execute Replay plugins

####DGA options

usage: maltese.py dga [-h] -p {necurs,sampledga} [-l {error,warning,info,debug}]

optional arguments:
  -h, --help                        show this help message and exit
  -l {error,warning,info,debug}     Logging level. Default is error

required arguments:
  -p {necurs,sampledga}             DGA Plugin module to run

####Replay options

usage: maltese.py replay [-h] -p {list,pcap} -i INPUT
                      [-l {error,warning,info,debug}]

optional arguments:
  -h, --help            show this help message and exit
  -l {error,warning,info,debug}
                        Logging level. Default is error

required arguments:
  -p {list,pcap}        Replay Plugin module to run
  -i INPUT              Input file for replay.

For details about various ways to evaluate a malware detector, please check out http://hpe.to/6047B7R0R

You can’t perform that action at this time.