intezer / ELF-Malware-Analysis-101Links
This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles
☆47Updated 3 years ago
Alternatives and similar repositories for ELF-Malware-Analysis-101
Users that are interested in ELF-Malware-Analysis-101 are comparing it to the libraries listed below
Sorting:
- Symbol hash for ELF files☆112Updated 3 years ago
- Capa analysis importer for Ghidra.☆63Updated 4 years ago
- Malware dynamic instrumentation tool based on frida framework☆110Updated 5 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆94Updated this week
- Robust Automated Malware Unpacker☆86Updated 2 years ago
- ☆63Updated 4 years ago
- Python scripts for Malware Bazaar☆156Updated last year
- Maco - Malware config extractor framework☆41Updated last month
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆32Updated 2 years ago
- Community modules for CAPE Sandbox☆107Updated this week
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆118Updated 2 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆82Updated 3 years ago
- IDA python plugin to scan binary with Yara rules☆180Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆123Updated 2 years ago
- Malware Configuration Extraction Modules☆51Updated last year
- Repository of Yara rules created by the Stratosphere team☆28Updated 4 years ago
- Powershell script deobfuscation using AST in Python☆72Updated 2 months ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- API Logger for Windows Executables☆80Updated 5 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- ☆97Updated 5 years ago
- ☆42Updated last year
- Automatic YARA rule generation for Malpedia☆164Updated 3 years ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆87Updated last month
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 5 months ago
- Fuzzy Hash calculated from import API of PE files☆90Updated 3 years ago