PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.
☆619Aug 8, 2022Updated 3 years ago
Alternatives and similar repositories for peframe
Users that are interested in peframe are comparing it to the libraries listed below
Sorting:
- A static analyzer for PE executables.☆1,107Feb 24, 2026Updated last week
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,233Aug 7, 2025Updated 6 months ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Official repository for Pyew.☆394Sep 6, 2019Updated 6 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373May 8, 2019Updated 6 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,897Feb 23, 2026Updated last week
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- yarGen is a generator for YARA rules☆1,776Jan 10, 2026Updated last month
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆208Jan 24, 2014Updated 12 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆340Feb 7, 2025Updated last year
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- C++ application that uses memory and code hooks to detect packers☆275Mar 5, 2018Updated 7 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- Repository of yara rules☆4,722Apr 17, 2024Updated last year
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 6 months ago
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆231Jan 18, 2024Updated 2 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Jul 27, 2017Updated 8 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- Malware static analysis framework☆185Apr 1, 2020Updated 5 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness☆526Jun 22, 2025Updated 8 months ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆476Jun 16, 2023Updated 2 years ago
- ☆987Jan 16, 2026Updated last month
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- YARA signature and IOC database for my scanners and tools☆2,874Feb 5, 2026Updated 3 weeks ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago