Kairos-T / Malware-Analysis-ToolkitLinks
[IN THE WORKS] Python script designed to provide comprehensive analysis of malware samples, combining static and dynamic analysis techniques to analyse the behaviour and characteristics of analysed malware. Utilises PEfile library and PyREBox (VM sandbox)
☆21Updated 2 years ago
Alternatives and similar repositories for Malware-Analysis-Toolkit
Users that are interested in Malware-Analysis-Toolkit are comparing it to the libraries listed below
Sorting:
- ☆25Updated 2 years ago
- Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.☆12Updated last year
- Make an Linux Kernel rootkit visible again.☆60Updated 9 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated 2 years ago
- ☆13Updated last year
- Collection of Tools & Techniques for analyzing URLs☆32Updated 2 years ago
- A python based Bot Net Framework☆43Updated 4 months ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Identifies metadata of .NET binary files.☆21Updated last year
- ☆11Updated last year
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- A not-curated list of cloud hacking labs☆27Updated last year
- Yet another awesome fuzzers list☆15Updated last year
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆15Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- ☆49Updated 9 months ago
- ☆35Updated 2 years ago
- ☆12Updated 2 years ago
- Simple and efficient file shredding☆14Updated 6 years ago
- MalDev & AV-EDR Evasion for Pentesters☆17Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 6 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆30Updated 6 months ago
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆21Updated 7 months ago