All Projects → maliceio → Malice

maliceio / Malice

Licence: apache-2.0
VirusTotal Wanna Be - Now with 100% more Hipster

Programming Languages

go
31211 projects - #10 most used programming language
golang
3204 projects

Projects that are alternatives of or similar to Malice

Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-94.49%)
Mutual labels:  malware, infosec, cybersecurity, malware-analysis, malware-research, virustotal
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (-82.92%)
Mutual labels:  malware, cybersecurity, infosec, malware-analysis, malware-research
Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (-77.57%)
Mutual labels:  malware, cybersecurity, antivirus, malware-analysis, malware-research
MalwareHashDB
Malware hashes for open source projects.
Stars: ✭ 31 (-97.53%)
Mutual labels:  malware, antivirus, malware-analysis, malware-research, virustotal
awesome-executable-packing
A curated list of awesome resources related to executable packing
Stars: ✭ 720 (-42.54%)
Mutual labels:  malware, cybersecurity, malware-analysis, malware-research
fame modules
Community modules for FAME
Stars: ✭ 55 (-95.61%)
Mutual labels:  malware, infosec, malware-analysis, malware-research
Malsub
A Python RESTful API framework for online malware analysis and threat intelligence services.
Stars: ✭ 308 (-75.42%)
Mutual labels:  malware, cybersecurity, malware-analysis, virustotal
Freki
🐺 Malware analysis platform
Stars: ✭ 285 (-77.25%)
Mutual labels:  malware, malware-analysis, malware-research, virustotal
Malcom
Malcom - Malware Communications Analyzer
Stars: ✭ 988 (-21.15%)
Mutual labels:  dfir, malware, infosec, malware-analysis
Malware-Machine-Learning
Malware Machine Learning
Stars: ✭ 26 (-97.92%)
Mutual labels:  malware, cybersecurity, malware-analysis, malware-research
Fame
FAME Automates Malware Evaluation
Stars: ✭ 663 (-47.09%)
Mutual labels:  malware, infosec, malware-analysis, malware-research
Malware-Zoo
Hashes of infamous malware
Stars: ✭ 18 (-98.56%)
Mutual labels:  malware, cybersecurity, malware-analysis, malware-research
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-94.41%)
Mutual labels:  cybersecurity, infosec, malware-analysis, malware-research
freki
🐺 Malware analysis platform
Stars: ✭ 327 (-73.9%)
Mutual labels:  malware, malware-analysis, malware-research, virustotal
Multiscanner
Modular file scanning/analysis framework
Stars: ✭ 494 (-60.57%)
Mutual labels:  malware, malware-analysis, malware-research, antivirus
Winappdbg
WinAppDbg Debugger
Stars: ✭ 338 (-73.02%)
Mutual labels:  infosec, malware-analysis, malware-research
Ir Rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (-75.18%)
Mutual labels:  dfir, malware, cybersecurity
Simplify
Android virtual machine and deobfuscator
Stars: ✭ 3,865 (+208.46%)
Mutual labels:  malware, malware-analysis, malware-research
Dex Oracle
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Stars: ✭ 398 (-68.24%)
Mutual labels:  malware, malware-analysis, malware-research
Drakvuf Sandbox
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
Stars: ✭ 384 (-69.35%)
Mutual labels:  malware, malware-analysis, malware-research

malice logo

malice

Circle CI License Release bh-arsenal Gitter

Malice's mission is to be a free open source version of VirusTotal that anyone can use at any scale from an independent researcher to a fortune 500 company.


Try It Out

DEMO: demo.malice.io

  • username: malice
  • password: ecilam

Requirements

Hardware

  • ~16GB disk space
  • ~4GB RAM

Software

Getting Started (OSX)

Install

$ brew install maliceio/tap/malice
Usage: malice [OPTIONS] COMMAND [arg...]

Open Source Malware Analysis Framework

Version: 0.3.11

Author:
  blacktop - <https://github.com/blacktop>

Options:
  --debug, -D      Enable debug mode [$MALICE_DEBUG]
  --help, -h       show help
  --version, -v    print the version

Commands:
  scan        Scan a file
  watch        Watch a folder
  lookup    Look up a file hash
  elk        Start an ELK docker container
  plugin    List, Install or Remove Plugins
  help        Shows a list of commands or help for one command

Run 'malice COMMAND --help' for more information on a command.

Scan some malware

$ malice scan evil.malware

NOTE: On the first run malice will download all of it's default plugins which can take a while to complete.

Malice will output the results as a markdown table that can be piped or copied into a results.md that will look great on Github see here

Start Malice's Web UI

$ malice elk

You can open the Kibana UI and look at the scan results here: http://localhost (assuming you are using Docker for Mac)

kibana-setup

  • Type in malice as the Index name or pattern and click Create.

  • Now click on the Malice Tab and behold!!!

kibana-plugin

Getting Started (Docker in Docker)

CircleCI Docker Stars Docker Pulls Docker Image

Install/Update all Plugins

docker run --rm -v /var/run/docker.sock:/var/run/docker.sock malice/engine plugin update --all

Scan a file

docker run --rm -v /var/run/docker.sock:/var/run/docker.sock \
                -v `pwd`:/malice/samples \
                --network="host" \
                -e MALICE_VT_API=$MALICE_VT_API \
                malice/engine scan SAMPLE

Documentation

Known Issues ⚠️

If you are having issues with malice connecting/writting to elasticsearch please see the following:

I have noticed when running the new 5.0+ version of malice/elasticsearch on a linux host you need to increase the memory map areas with the following command

sudo sysctl -w vm.max_map_count=262144

Elasticsearch requires a LOT of RAM to run smoothly. You can lower it to 2GB by running the following (before running a scan):

$ docker run -d \
         -p 9200:9200 \
         --name malice-elastic \
         -e ES_JAVA_OPTS="-Xms2g -Xmx2g" \
         malice/elasticsearch

See here for more details on Known Issues/FAQs ⚠️

Issues

Find a bug? Want more features? Find something missing in the documentation? Let me know! Please don't hesitate to file an issue

CHANGELOG

See CHANGELOG.md

License

Apache License (Version 2.0)
Copyright (c) 2013 - 2018 blacktop Joshua Maine

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].