JusticeRage / awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
☆14Updated 7 years ago
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
Sorting:
- Automatic generator of YARA modules based in protocol buffers☆16Updated 3 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆29Updated 5 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆16Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- ☆18Updated last year
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Work in Progress repo☆14Updated 6 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 8 years ago
- ☆18Updated 4 years ago
- This is a small Python3 script that allows you to search and download samples from Hybrid Analysis' v2 API☆9Updated 5 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- VirusTotal Intelligence Search☆37Updated 4 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- Fighting String Encryption in Android Malware☆58Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago