JusticeRage / awesome-malware-analysisLinks
A curated list of awesome malware analysis tools and resources
☆15Updated 7 years ago
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
Sorting:
- ☆24Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Fighting String Encryption in Android Malware☆59Updated 3 years ago
- Dataset of packed ELF samples☆21Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆32Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- CLI tool to analyze APKs☆43Updated last year
- Easiest way to download samples through VirusTotal Intelligence☆38Updated 8 years ago
- Dragon Sandbox☆79Updated 12 years ago
- repo with compromised keys and such☆23Updated 2 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 3 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆23Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆67Updated 6 months ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆95Updated 4 years ago
- ☆70Updated 7 years ago
- Scripts to secure and harden Mac OS X☆30Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆28Updated 4 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Updated 6 years ago
- (Abandoned) Extract packages from an Android device☆52Updated 4 years ago
- Collection of YARA rules designed for usage through VirusTotal.com.☆79Updated last year
- ☆36Updated 6 years ago
- Official Malice Plugins☆20Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆21Updated 7 years ago