Kairos-T / Malware-Analysis-ToolkitLinks
[IN THE WORKS] Python script designed to provide comprehensive analysis of malware samples, combining static and dynamic analysis techniques to analyse the behaviour and characteristics of analysed malware. Utilises PEfile library and PyREBox (VM sandbox)
☆16Updated 2 years ago
Alternatives and similar repositories for Malware-Analysis-Toolkit
Users that are interested in Malware-Analysis-Toolkit are comparing it to the libraries listed below
Sorting:
- Identifies metadata of .NET binary files.☆21Updated last year
- IDA Python scripts☆41Updated 4 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 7 months ago
- ☆12Updated last year
- ☆28Updated 6 months ago
- General malware analysis stuff☆37Updated 11 months ago
- bad stuffs by bad guys☆48Updated 3 years ago
- ☆39Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Script to chain search parameters for MalwareBazaar☆12Updated 6 months ago
- ☆22Updated last year
- ☆25Updated last year
- ☆25Updated 2 years ago
- ETW forensic tool for Volatility3 plugin☆16Updated 8 months ago
- Volatility Symbol Generator for Linux Kernels☆35Updated last year
- ☆46Updated 5 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Collection of my own detection rules☆21Updated last month
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated 8 months ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- ☆27Updated 8 months ago
- Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.☆11Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆55Updated 2 weeks ago
- Presentation slides, blogs, and videos of my conference presentations.☆26Updated last year
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆64Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 7 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆25Updated last week
- ☆16Updated 3 months ago