joesecurity / awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
☆21Updated 7 years ago
Alternatives and similar repositories for awesome-malware-analysis:
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
- Community modules for FAME☆65Updated 2 months ago
- Yara rules to be used with the Burp Yara-Scanner extension☆45Updated 3 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆82Updated last year
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- VSCode extension for the YARA pattern matching language☆63Updated last year
- ☆43Updated 6 years ago
- A Yara rule generator for finding related samples and hunting☆157Updated 2 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- My Yara Rules Collection☆52Updated 8 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Messing around with clamav sigs☆26Updated 4 years ago
- Cockroach is your primitive & immortal swiss army knife.☆47Updated 3 years ago
- Client library for the mwdb service by CERT Polska.☆40Updated 2 months ago
- Python IOC Editor☆62Updated 9 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆81Updated 7 years ago
- Extract GUIDs from .NET assemblies☆21Updated 8 years ago
- Tools for parsing rulesets using the exact grammar as YARA. Written in Go.☆83Updated 2 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Cuckoo Agent.☆23Updated 5 years ago
- Ursnif beacon decryptor☆27Updated last year
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 9 years ago
- ☆17Updated 7 years ago
- ☆42Updated 4 years ago
- A mapping of used malware names to commonly known family names☆62Updated last year
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆105Updated 6 years ago
- ☆68Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Yara rules for detecting malware☆23Updated 4 months ago
- PE Import Hash Generator☆75Updated 7 years ago