All Projects → indetectables-net → toolkit

indetectables-net / toolkit

Licence: other
The essential toolkit for reversing, malware analysis, and cracking

Programming Languages

Inno Setup
370 projects
python
139335 projects - #7 most used programming language
c
50402 projects - #5 most used programming language
Batchfile
5799 projects
NSIS
403 projects
powershell
5483 projects

Projects that are alternatives of or similar to toolkit

NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-65.34%)
Mutual labels:  infosec, infosec-reference
Fame
FAME Automates Malware Evaluation
Stars: ✭ 663 (+276.7%)
Mutual labels:  infosec, malware-analysis
Winappdbg
WinAppDbg Debugger
Stars: ✭ 338 (+92.05%)
Mutual labels:  infosec, malware-analysis
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-60.23%)
Mutual labels:  infosec, malware-analysis
M4ngl3m3
Common password pattern generator using strings list
Stars: ✭ 103 (-41.48%)
Mutual labels:  infosec, cracking
Pentesting
Misc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-86.36%)
Mutual labels:  infosec, infosec-reference
Cs7038 Malware Analysis
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
Stars: ✭ 378 (+114.77%)
Mutual labels:  infosec, malware-analysis
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+21.59%)
Mutual labels:  infosec, malware-analysis
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+611.93%)
Mutual labels:  infosec, malware-analysis
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-60.8%)
Mutual labels:  infosec, malware-analysis
fame modules
Community modules for FAME
Stars: ✭ 55 (-68.75%)
Mutual labels:  infosec, malware-analysis
Binsnitch
Detect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-18.18%)
Mutual labels:  infosec, malware-analysis
Resources-for-Application-Security
Some good resources for getting started with application security
Stars: ✭ 97 (-44.89%)
Mutual labels:  infosec, infosec-reference
APAC-Meetups
A community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 52 (-70.45%)
Mutual labels:  infosec, infosec-reference
SuperLibrary
Information Security Library
Stars: ✭ 60 (-65.91%)
Mutual labels:  infosec, malware-analysis
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+2264.77%)
Mutual labels:  infosec, infosec-reference
Anti-Debugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (+68.75%)
Mutual labels:  malware-analysis, cracking
Antidebugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-8.52%)
Mutual labels:  malware-analysis, cracking
Malcom
Malcom - Malware Communications Analyzer
Stars: ✭ 988 (+461.36%)
Mutual labels:  infosec, malware-analysis
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (-36.36%)
Mutual labels:  infosec, malware-analysis

English | Español | 简体中文

Indetectables Toolkit

This tool compilation is carefully crafted with the purpose of being useful both for the beginners and veterans from the malware analysis world. It has also proven useful for people trying their luck at the cracking underworld.

It's the ideal complement to be used with the manuals from the site, and to play with the numbered theories mirror.

Advantages

To be clear, this pack is thought to be the most complete and robust in existence. Some of the pros are:

  1. It contains all the basic (and not so basic) tools that you might need in a real life scenario, be it a simple or a complex one.

  2. The pack is integrated with an Universal Updater made by us from scratch. Thanks to that, we get to mantain all the tools in an automated fashion.

  3. It's really easy to expand and modify: you just have to update the file bin\updater\tools.ini to integrate the tools you use to the updater, and then add the links for your tools to bin\sendto\sendto, so they appear in the context menus.

  4. The installer sets up everything we might need automatically - everything, from the dependencies to the environment variables, and it can even add a scheduled task to update the whole pack of tools weekly.

Installation

  1. You can simply download the stable versions from the release section, where you can also find the installer.

  2. Once downloaded, you can update the tools with the Universal Updater that we specifically developed for that sole purpose.
    You will find the binary in the folder bin\updater\updater.exe.

Tool set

This toolkit is composed by +80 apps that cover everything we might need to perform reverse engineering and binary/malware analysis.
Every tool has been downloaded from their original/official websites, but we still recommend you to use them with caution, specially those tools whose official pages are forum threads. Always exercise common sense.
You can check the complete list of tools here.

About contributions

Pull Requests are welcome. If you'd want to propose big changes, you should first create an Issue about it, so we all can analyze and discuss it. The tools are compressed with 7-zip, and the format used for nomenclature is {name} - {version}.7z

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].