JusticeRage / awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
☆14Updated 7 years ago
Alternatives and similar repositories for awesome-malware-analysis:
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
- Automatic generator of YARA modules based in protocol buffers☆16Updated 2 months ago
- pure Python binary analysis framework☆23Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 7 years ago
- This is a small Python3 script that allows you to search and download samples from Hybrid Analysis' v2 API☆9Updated 5 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- A tool to automatically decode and translate any TCP hexa payload data form any language to english.☆17Updated 2 years ago
- Toolkit to detected abnormal activities on a Windows machine.☆11Updated 9 years ago
- ☆24Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Work in Progress repo☆14Updated 5 years ago
- CLI tool to analyze APKs☆42Updated last year
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆16Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Dynamic Malware Analsysis Sandbox☆12Updated last year
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated last month
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- app.any.run malware submissions client☆16Updated 5 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆24Updated 8 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- ☆9Updated 5 years ago
- ☆12Updated 3 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago