All Projects → fortinet → ips-bph-framework

fortinet / ips-bph-framework

Licence: Apache-2.0 License
BLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a Command-and-Control (C&C) architecture

Programming Languages

AutoIt
60 projects
python
139335 projects - #7 most used programming language
PHP
23972 projects - #3 most used programming language
HTML
75241 projects
Roff
2310 projects
powershell
5483 projects

Projects that are alternatives of or similar to ips-bph-framework

Locky
Stars: ✭ 61 (+190.48%)
Mutual labels:  analysis, malware
Flashmingo
Automatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 115 (+447.62%)
Mutual labels:  analysis, malware
Data
APTnotes data
Stars: ✭ 1,126 (+5261.9%)
Mutual labels:  analysis, malware
Php Malware Analysis
Deobfuscation and analysis of PHP malware captured by a WordPress honey pot
Stars: ✭ 82 (+290.48%)
Mutual labels:  analysis, malware
flashmingo
Automatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (+457.14%)
Mutual labels:  analysis, malware
Manalyze
A static analyzer for PE executables.
Stars: ✭ 701 (+3238.1%)
Mutual labels:  analysis, malware
Illuminatejs
IlluminateJS is a static JavaScript deobfuscator
Stars: ✭ 96 (+357.14%)
Mutual labels:  analysis, malware
Binee
Binee: binary emulation environment
Stars: ✭ 408 (+1842.86%)
Mutual labels:  analysis, malware
rhino
Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors
Stars: ✭ 49 (+133.33%)
Mutual labels:  analysis, malware
Elfparser
Cross Platform ELF analysis
Stars: ✭ 228 (+985.71%)
Mutual labels:  analysis, malware
Qiling
Qiling Advanced Binary Emulation Framework
Stars: ✭ 2,816 (+13309.52%)
Mutual labels:  analysis, malware
Automated-Malware-Analysis-List
My personal Automated Malware Analysis Sandboxes and Services
Stars: ✭ 20 (-4.76%)
Mutual labels:  analysis, malware
cerberus research
Research tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (+423.81%)
Mutual labels:  analysis, malware
MalScan
A Simple PE File Heuristics Scanners
Stars: ✭ 41 (+95.24%)
Mutual labels:  analysis, malware
analysis-net
Static analysis framework for .NET programs.
Stars: ✭ 19 (-9.52%)
Mutual labels:  analysis
mitre-visualizer
🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (+133.33%)
Mutual labels:  malware
Ragnarok
Virus Package ( For Educational Purposes )
Stars: ✭ 23 (+9.52%)
Mutual labels:  malware
Windows-APT-Warfare
著作《Windows APT Warfare:惡意程式前線戰術指南》各章節技術實作之原始碼內容
Stars: ✭ 241 (+1047.62%)
Mutual labels:  malware
RDPlot
Tool for plotting rd curves from output of video coding test model software
Stars: ✭ 22 (+4.76%)
Mutual labels:  analysis
RoboThief-Telegram-Session-Stealer
Robo Thief is a software for steal telegram session .
Stars: ✭ 18 (-14.29%)
Mutual labels:  malware

BLACKPHENIX - MALWARE ANALYSIS + AUTOMATION FRAMEWORK

BLACKPHENIX is an open-source malware analysis automation framework composed of services, scripts, plug-ins, and tools based on a Command-and-Control (C&C) architecture. It relies on virtual machine software to operate and scripts to remotely control (GUI and console) tools and scripts running on a guest (analysis) virtual machine. It reports back results to a controller machine to perform further deep data analysis and execution decisions.

This framework was released and presented at BlackHat Arsenal 2019

How this framework can be used?

Analysts can use the framework to perform automated, virtual machine-based malware analysis activities by automating the execution of well-known analysis tools, custom tools, and scripts that run in a remote virtual machine. They can do this through the execution of python scripts called “BPH Scripts” and “BPH Analysis Modules” to perform parsing and further data analysis.

A malware analyst can use the framework to fulfill a specific requirement that needs to be performed within a tight schedule, such as writing a quick prototype to collect specific data when a malware sample behaves in certain way.

For more information, please refer to the framework's documentation.

Documentation

Authors

  • Chris Navarrete

Contact

License

This project is licensed under the Apache 2.0 License - see the LICENSE.md file for details

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].