fireeye / toolsLinks
general purpose and malware specific analysis tools
☆101Updated 10 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- ☆82Updated 9 years ago
- A warehouse for your malware☆133Updated 12 years ago
- Process HTTP Pcaps With YARA☆106Updated 12 years ago
- Differential Analysis of Malware in Memory☆213Updated 8 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆93Updated 10 years ago
- Malware Repository Framework☆99Updated 7 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Updated 10 years ago
- ☆68Updated 8 years ago
- Various config files obtained during malware analysis☆67Updated 7 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- PE Import Hash Generator☆79Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- A Yara rule generator for finding related samples and hunting☆159Updated 3 years ago
- Modified edition of cuckoo community modules☆32Updated 6 years ago
- ☆135Updated 6 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Updated 9 years ago
- A Python library and command line tools to provide interactive log visualization.☆141Updated 2 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆144Updated 5 years ago
- Various scripts for different malware families☆106Updated 4 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 9 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Yara rules for malware families seen as part of targeted threats project☆141Updated 8 years ago
- Tool to help analyze PDF files☆186Updated 11 years ago
- Malware static analysis framework☆180Updated 5 years ago
- YARA rules for use with ProcFilter☆88Updated 8 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated 2 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- A collection of infosec related scripts and information.☆53Updated last year