hasherezade / malware_analysisLinks
Various snippets created during malware analysis
☆464Updated 4 months ago
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below
Sorting:
- A tool to detect and crash Cuckoo Sandbox☆297Updated last year
- Code written as part of our various malware investigations☆409Updated 2 months ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆479Updated 2 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆619Updated 3 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Updated 4 years ago
- C++ application that uses memory and code hooks to detect packers☆274Updated 7 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398Updated 9 years ago
- Collaborative malware analysis framework☆380Updated 7 years ago
- A collection of tools for dealing with TrickBot☆203Updated 8 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆292Updated 8 years ago
- Official repository for Pyew.☆394Updated 6 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆518Updated last year
- Malware Analyst's Cookbook stuffs☆159Updated 10 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Updated 8 years ago
- A repository of tools and scripts related to malware analysis☆252Updated 9 years ago
- For all these times you're asking yourself "what is this panel again?"☆260Updated last week
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆294Updated 2 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆208Updated 12 years ago
- Malware Configuration And Payload Extraction☆761Updated last year
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Updated 2 years ago
- Automatic Yara Rule Generation☆333Updated 10 years ago
- Modified edition of cuckoo☆406Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Updated 7 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆171Updated 6 years ago
- Differential Analysis of Malware in Memory☆215Updated 8 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Updated 4 years ago
- A tool to retrieve malware directly from the source for security researchers.☆564Updated 8 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 3 years ago
- Set of tools for interacting with Malshare☆159Updated 5 years ago