JusticeRage / awesome-malware-analysisLinks
A curated list of awesome malware analysis tools and resources
☆15Updated 7 years ago
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
Sorting:
- Automatic generator of YARA modules based in protocol buffers☆16Updated 5 months ago
- ☆70Updated 6 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- repo with compromised keys and such☆22Updated 2 years ago
- This is a small Python3 script that allows you to search and download samples from Hybrid Analysis' v2 API☆9Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆63Updated last month
- Dragon Sandbox☆78Updated 12 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆29Updated 5 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆14Updated 4 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11Updated 6 years ago
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆38Updated 9 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Papers summaries of some of the most important Mobile Security Papers 📃☆7Updated 6 years ago
- Fighting String Encryption in Android Malware☆59Updated 3 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆24Updated 5 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago