{"id":31786307,"url":"https://github.com/cybersecurity-dev/sfet","last_synced_at":"2025-10-10T12:51:31.386Z","repository":{"id":290031671,"uuid":"972659724","full_name":"cybersecurity-dev/SFET","owner":"cybersecurity-dev","description":"SFET | Static Feature Extraction Tool for Potentially Malicious OS Files","archived":false,"fork":false,"pushed_at":"2025-09-04T19:09:53.000Z","size":19,"stargazers_count":2,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-09-04T20:26:59.219Z","etag":null,"topics":["android","android-reverse-engineering","apk","apk-parser","elf","elf-parser","exe","exe-parser","linux","linux-reverse-engineering","static-analysis","static-analyzer","windows","windows-reverse-engineering"],"latest_commit_sha":null,"homepage":"","language":"Dockerfile","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/cybersecurity-dev.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2025-04-25T12:51:14.000Z","updated_at":"2025-09-04T19:09:57.000Z","dependencies_parsed_at":"2025-09-04T20:15:27.782Z","dependency_job_id":"36c083a1-de53-4de0-a94b-07b224e70554","html_url":"https://github.com/cybersecurity-dev/SFET","commit_stats":null,"previous_names":["cybersecurity-dev/sbfe"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/cybersecurity-dev/SFET","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FSFET","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FSFET/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FSFET/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FSFET/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/cybersecurity-dev","download_url":"https://codeload.github.com/cybersecurity-dev/SFET/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FSFET/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":279003890,"owners_count":26083641,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-10T02:00:06.843Z","response_time":62,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["android","android-reverse-engineering","apk","apk-parser","elf","elf-parser","exe","exe-parser","linux","linux-reverse-engineering","static-analysis","static-analyzer","windows","windows-reverse-engineering"],"created_at":"2025-10-10T12:51:26.697Z","updated_at":"2025-10-10T12:51:31.380Z","avatar_url":"https://github.com/cybersecurity-dev.png","language":"Dockerfile","readme":"# **SFET** | _Static Feature Extraction Tool_ for Potentially Malicious OS Files\n[![made-with-python](http://forthebadge.com/images/badges/made-with-python.svg)](https://www.python.org/)\n[![built-with-science](https://forthebadge.com/images/badges/built-with-science.svg)](https://cyberthreatdefence.com/)\n[![open-source](https://forthebadge.com/images/badges/open-source.svg)](https://cyberthreatdefence.com/)\n\n\u003cdetails\u003e\n\n\u003csummary\u003eInstall required tools on Linux\u003c/summary\u003e\n\n### For Ubuntu 18.04, 20.04, 22.04\n\n```bash\nsudo apt-get update\n```\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\n\u003csummary\u003eInstall required tools on Windows\u003c/summary\u003e\n\n\u003c/details\u003e\n\n\n\u003cdetails\u003e\n\n\u003csummary\u003eInstall required python libs\u003c/summary\u003e\n\n### pip install\n```bash\npip install -r requirements.txt\npython3 setup.py install\n```\n\n### conda install\n```bash\nconda config --add channels conda-forge\nconda install --file requirements_conda.txt\npython3 setup.py install\n```\n\n\u003c/details\u003e\n\n\n## Supported File Formats:\n\nThe analyzer supports multiple file formats including:\n- Windows executables (.exe, .dll)\n- Linux executables (.elf, .so)\n- Android executables (.apk)\n\n### To Do:\n\n- Scripts (.ps1, .bat)\n- Scripts (.sh)\n- Scripts (.js, .hta)\n- And more\n\n##\n\n### Contributing\n\n[Contributions of any kind welcome, just follow the guidelines](contributing.md)!\n\n### Contributors\n\n[Thanks goes to these contributors](https://github.com/cybersecurity-dev/SFET/graphs/contributors)!\n\n[🔼 Back to top](#sfet--static-feature-extraction-tool-for-potentially-malicious-os-files)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Fsfet","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcybersecurity-dev%2Fsfet","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Fsfet/lists"}