nikhilh-20 / ELFEN
ELFEN: Automated Linux Malware Analysis Sandbox
☆124Updated 9 months ago
Alternatives and similar repositories for ELFEN:
Users that are interested in ELFEN are comparing it to the libraries listed below
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆143Updated 9 months ago
- ☆114Updated this week
- Repository of Yara Rules☆110Updated 3 weeks ago
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 4 months ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆209Updated 2 years ago
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆43Updated last month
- Configuration Extractors for Malware☆104Updated 2 weeks ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆160Updated last month
- ☆221Updated 3 months ago
- Linpmem is a linux memory acquisition tool☆82Updated 11 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆175Updated last week
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated last year
- Python tool to check rootkits in Windows kernel☆196Updated 2 months ago
- Elastic Security Labs releases☆63Updated last month
- A C# based tool for analysing malicious OneNote documents☆113Updated 2 years ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆45Updated this week
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 3 months ago
- A specification and style guide for YARA rules☆48Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆149Updated 7 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ☆73Updated last year
- Powershell Linter☆50Updated this week
- A guide on how to write fast and memory friendly YARA rules☆142Updated 2 months ago
- ☆65Updated 2 years ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- Collection of rules created using YARA-Signator over Malpedia☆128Updated 5 months ago