All Projects → enkomio → Sojobo

enkomio / Sojobo

Licence: other
A binary analysis framework

Programming Languages

fsharp
127 projects

Projects that are alternatives of or similar to Sojobo

Polichombr
Collaborative malware analysis framework
Stars: ✭ 307 (+164.66%)
Mutual labels:  security-tools, malware-analysis, malware-research, reverse-engineering
Detect It Easy
Program for determining types of files for Windows, Linux and MacOS.
Stars: ✭ 2,982 (+2470.69%)
Mutual labels:  malware-analysis, malware-research, program-analysis, reverse-engineering
Xapkdetector
APK/DEX detector for Windows, Linux and MacOS.
Stars: ✭ 208 (+79.31%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Drsemu
DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior
Stars: ✭ 237 (+104.31%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Replica
Ghidra Analysis Enhancer 🐉
Stars: ✭ 194 (+67.24%)
Mutual labels:  security-tools, malware-analysis, reverse-engineering
Probedroid
A SDK for the creation of analysis tools without obtaining app source code in order to profile runtime performance, examine code coverage, and track high-risk behaviors of a given app on Android 5.0 and above.
Stars: ✭ 182 (+56.9%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Apkfile
Android app analysis and feature extraction library
Stars: ✭ 190 (+63.79%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Malware Analysis Scripts
Collection of scripts for different malware analysis tasks
Stars: ✭ 61 (-47.41%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Malwarelab vm Setup
Setup scripts for my Malware Analysis VMs
Stars: ✭ 126 (+8.62%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Freki
🐺 Malware analysis platform
Stars: ✭ 285 (+145.69%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Simplify
Android virtual machine and deobfuscator
Stars: ✭ 3,865 (+3231.9%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Antidebugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (+38.79%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Dex Oracle
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Stars: ✭ 398 (+243.1%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Malwaresearch
A command line tool to find malwares on http://openmalware.org
Stars: ✭ 190 (+63.79%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Nauz File Detector
Linker/Compiler/Tool detector for Windows, Linux and MacOS.
Stars: ✭ 146 (+25.86%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Rebel Framework
Advanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+57.76%)
Mutual labels:  security-tools, malware-analysis, reverse-engineering
Pafish
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
Stars: ✭ 2,026 (+1646.55%)
Mutual labels:  reverse-engineering, malware-analysis, malware-research
Shed
.NET runtime inspector
Stars: ✭ 229 (+97.41%)
Mutual labels:  security-tools, malware-analysis, reverse-engineering
Drakvuf Sandbox
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
Stars: ✭ 384 (+231.03%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering
Pev
The PE file analysis toolkit
Stars: ✭ 422 (+263.79%)
Mutual labels:  malware-analysis, malware-research, reverse-engineering

Sojobo - A binary analysis framework

Sojobo is an emulator for the B2R2 framework. It was created to easier the analysis of potentially malicious files. It is totally developed in .NET so you don't need to install or compile any other external libraries (the project is self contained).

With Sojobo you can:

  • Emulate a (32 bit) PE binary
  • Inspect the memory of the emulated process
  • Read the process state
  • Display a disassembly of the executed code
  • Emulate functions in a managed language (C# || F#)

Tools using Sojobo

  • ADVDeobfuscator

ADV Deobfuscator - A string deobfuscator for ADVObfuscator

ADVDeobfuscator is tool based on the Sojobo binary analysis framework that analyzes a binary obfuscated with ADBObfuscator and decodes the identified strings.

Download

A compiled version is available to Community sponsored users. If you are a sponsored user you can download the binary from: https://github.com/enkomio-sponsor/compiled_binaries

Documentation

The image below shows an execution of ADVDeobfuscator on the Conti Ransomware.

The image below shows an execution of ADVDeobfuscator on the Taurus Stealer (see also Predator the thief).

I wrote a blog post on how to deobfuscate the Team 9 binaries.

Using Sojobo

Sojobo is intended to be used as a framework to create program analysis utilities. However, various sample utilities were created in order to show how to use the framework in a profitable way.

Download

Documentation

The project is fully documented in F# (cit.) :) Joking apart, I plan to write some blog posts related to how to use Sojobo. Below a list of the current posts:

You can also read the API documentation.

Compile

In order to compile Sojobo you need .NET Core to be installed and Visual Studio. To compile just run build.bat.

License

Copyright (C) 2019 Antonio Parata - @s4tan

Sojobo is licensed under the Creative Commons.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].