Nauz File DetectorLinker/Compiler/Tool detector for Windows, Linux and MacOS.
Stars: ✭ 146 (-48.23%)
ApkfileAndroid app analysis and feature extraction library
Stars: ✭ 190 (-32.62%)
ApklabAndroid Reverse-Engineering Workbench for VS Code
Stars: ✭ 470 (+66.67%)
XapkdetectorAPK/DEX detector for Windows, Linux and MacOS.
Stars: ✭ 208 (-26.24%)
DrsemuDrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior
Stars: ✭ 237 (-15.96%)
SimpleatorSimpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that were added in Windows 10 Spring Update (1803), also called "Redstone 4", with additional improvements that were made in Windows 10 October Update (1809), aka "Redstone 5".
Stars: ✭ 260 (-7.8%)
Makinmakin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]
Stars: ✭ 645 (+128.72%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-75.53%)
MazewalkerToolkit for enriching and speeding up static malware analysis
Stars: ✭ 132 (-53.19%)
SimplifyAndroid virtual machine and deobfuscator
Stars: ✭ 3,865 (+1270.57%)
Drakvuf SandboxDRAKVUF Sandbox - automated hypervisor-level malware analysis system
Stars: ✭ 384 (+36.17%)
StringsifterA machine learning tool that ranks strings based on their relevance for malware analysis.
Stars: ✭ 469 (+66.31%)
FclFCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (+45.04%)
DrebinDrebin - NDSS 2014 Re-implementation
Stars: ✭ 52 (-81.56%)
MatireMalware Analysis, Threat Intelligence and Reverse Engineering: LABS
Stars: ✭ 55 (-80.5%)
SojoboA binary analysis framework
Stars: ✭ 116 (-58.87%)
ProbedroidA SDK for the creation of analysis tools without obtaining app source code in order to profile runtime performance, examine code coverage, and track high-risk behaviors of a given app on Android 5.0 and above.
Stars: ✭ 182 (-35.46%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (-35.11%)
CmulatorCmulator is ( x86 - x64 ) Scriptable Reverse Engineering Sandbox Emulator for shellcode and PE binaries . Based on Unicorn & Zydis Engine & javascript
Stars: ✭ 197 (-30.14%)
LiefAuthors
Stars: ✭ 2,730 (+868.09%)
Threat HuntingPersonal compilation of APT malware from whitepaper releases, documents and own research
Stars: ✭ 219 (-22.34%)
GefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+1388.3%)
StoqAn open source framework for enterprise level automated analysis.
Stars: ✭ 352 (+24.82%)
Dex OracleA pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Stars: ✭ 398 (+41.13%)
PwndbgExploit Development and Reverse Engineering with GDB Made Easy
Stars: ✭ 4,178 (+1381.56%)
PevThe PE file analysis toolkit
Stars: ✭ 422 (+49.65%)
IdenlibidenLib - Library Function Identification [This project is not maintained anymore]
Stars: ✭ 322 (+14.18%)
WeDefend⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan
Stars: ✭ 23 (-91.84%)
PecliCLI tool to analyze PE files
Stars: ✭ 46 (-83.69%)
ApkidAndroid Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Stars: ✭ 999 (+254.26%)
Virustotal ToolsSubmits multiple domains to VirusTotal API
Stars: ✭ 29 (-89.72%)
CapaThe FLARE team's open-source tool to identify capabilities in executable files.
Stars: ✭ 1,981 (+602.48%)
Awesome YaraA curated list of awesome YARA rules, tools, and people.
Stars: ✭ 1,394 (+394.33%)
csbdThe repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios"
Stars: ✭ 20 (-92.91%)
PolichombrCollaborative malware analysis framework
Stars: ✭ 307 (+8.87%)
AntidbgA bunch of Windows anti-debugging tricks for x86 and x64.
Stars: ✭ 177 (-37.23%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-42.91%)
Detect It EasyProgram for determining types of files for Windows, Linux and MacOS.
Stars: ✭ 2,982 (+957.45%)
ApiscoutThis project aims at simplifying Windows API import recovery on arbitrary memory dumps
Stars: ✭ 146 (-48.23%)
ReplicaGhidra Analysis Enhancer 🐉
Stars: ✭ 194 (-31.21%)
MalwaresearchA command line tool to find malwares on http://openmalware.org
Stars: ✭ 190 (-32.62%)
assemblylineAssemblyLine 4 - File triage and malware analysis
Stars: ✭ 69 (-75.53%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (-61.35%)
Flare VmNo description or website provided.
Stars: ✭ 3,201 (+1035.11%)
yaraMalice Yara Plugin
Stars: ✭ 27 (-90.43%)
Shed.NET runtime inspector
Stars: ✭ 229 (-18.79%)
MedusaBinary instrumentation framework based on FRIDA
Stars: ✭ 258 (-8.51%)
Macbook《macOS软件安全与逆向分析》随书源码
Stars: ✭ 302 (+7.09%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-53.19%)
Radare2UNIX-like reverse engineering framework and command-line toolset
Stars: ✭ 15,412 (+5365.25%)
malware-writeupsPersonal research and publication on malware families
Stars: ✭ 104 (-63.12%)