hasherezade / malware_analysisLinks
Various snippets created during malware analysis
☆458Updated 3 weeks ago
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below
Sorting:
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆615Updated 3 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Updated 4 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- Code written as part of our various malware investigations☆403Updated 9 months ago
- Official repository for Pyew.☆390Updated 6 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆509Updated last year
- For all these times you're asking yourself "what is this panel again?"☆258Updated 2 years ago
- Malware Configuration And Payload Extraction☆759Updated 11 months ago
- Collaborative malware analysis framework☆377Updated 6 years ago
- C++ application that uses memory and code hooks to detect packers☆271Updated 7 years ago
- A collection of tools for dealing with TrickBot☆202Updated 7 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398Updated 9 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆290Updated 8 years ago
- rVMI - A New Paradigm For Full System Analysis☆358Updated 8 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆475Updated 2 years ago
- Modified edition of cuckoo☆403Updated 7 years ago
- snake - a malware storage zoo☆217Updated 2 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆278Updated 3 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆171Updated 6 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Updated last year
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆206Updated 11 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆288Updated 2 years ago
- Modified edition of cuckoo☆269Updated 6 years ago
- A YARA-integrated process denial framework for Windows☆396Updated 5 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- A Tool for Automatic Analysis of Malware Behavior☆372Updated 6 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 3 years ago
- A repository of tools and scripts related to malware analysis☆253Updated 9 years ago