Various snippets created during malware analysis
☆464Oct 3, 2025Updated 5 months ago
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below
Sorting:
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- Demos of various injection techniques found in malware☆794Feb 15, 2022Updated 4 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- ☆91Oct 28, 2016Updated 9 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆269Jun 15, 2021Updated 4 years ago
- Malware Configuration And Payload Extraction☆762Nov 22, 2024Updated last year
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- FAME Automates Malware Evaluation☆930Dec 16, 2025Updated 3 months ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- A static analyzer for PE executables.☆1,112Mar 11, 2026Updated last week
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,239Aug 7, 2025Updated 7 months ago
- Useful Scripts for helping in reverse engeenering☆181Sep 25, 2020Updated 5 years ago
- Persistent IAT hooking application - based on bearparser☆265Sep 18, 2022Updated 3 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆230Mar 22, 2023Updated 2 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 7 months ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆295Sep 30, 2023Updated 2 years ago
- IFL - Interactive Functions List (plugin for IDA Pro)☆488Feb 27, 2026Updated 3 weeks ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Jan 18, 2024Updated 2 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Portable Executable parsing library (from PE-bear)☆660Oct 4, 2025Updated 5 months ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- Demos of various (also non standard) persistence methods used by malware☆224Mar 5, 2023Updated 3 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆742Mar 17, 2019Updated 7 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,043Aug 23, 2021Updated 4 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- ☆113Jun 12, 2017Updated 8 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,427Nov 16, 2023Updated 2 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Converts a DLL into EXE☆816Jul 23, 2023Updated 2 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago