Malware analysis tool
☆22Apr 27, 2025Updated 10 months ago
Alternatives and similar repositories for malelf
Users that are interested in malelf are comparing it to the libraries listed below
Sorting:
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Yaras Random☆23Feb 21, 2019Updated 7 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Dynamic malware analysis for the Android platform☆40Sep 26, 2014Updated 11 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 10 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- Malware.lu tools☆63Oct 28, 2013Updated 12 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago