ashemery / malware-toolsLinks
A list of useful tools for Malware Analysis (will be updated regularly)
☆153Updated 4 months ago
Alternatives and similar repositories for malware-tools
Users that are interested in malware-tools are comparing it to the libraries listed below
Sorting:
- ☆121Updated this week
- ELFEN: Automated Linux Malware Analysis Sandbox☆131Updated 4 months ago
- A comprehensive Hypervisor resources repo☆187Updated last month
- Python tool to check rootkits in Windows kernel☆204Updated 4 months ago
- ☆71Updated 11 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆57Updated 3 months ago
- A ProcessMonitor visualization application written in rust.☆183Updated 2 years ago
- Repository of Yara Rules☆132Updated 3 weeks ago
- A dynamic unpacking tool☆145Updated 2 years ago
- Advanced static analysis tool☆101Updated last month
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆63Updated 5 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆65Updated last month
- Configuration Extractors for Malware☆121Updated 8 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- ☆112Updated 2 weeks ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆200Updated 3 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆167Updated last year
- ☆139Updated 2 years ago
- Some of my Malware Analysis writeups☆48Updated 2 months ago
- Public repository containing materials for various malware-related streams.☆46Updated last month
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆74Updated 4 months ago
- A Repository to Track Anti-Forensic Techniques☆118Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆77Updated last year
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆51Updated last year
- IDA Python scripts☆40Updated 8 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- ☆39Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆78Updated last year
- ☆164Updated 9 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆321Updated 2 years ago