PwndbgExploit Development and Reverse Engineering with GDB Made Easy
Stars: ✭ 4,178 (+1177.68%)
FclFCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (+25.08%)
mazMalware Analysis Zoo
Stars: ✭ 25 (-92.35%)
MalwaresourcecodeCollection of malware source code for a variety of platforms in an array of different programming languages.
Stars: ✭ 8,666 (+2550.15%)
Malware analysisVarious snippets created during malware analysis
Stars: ✭ 413 (+26.3%)
rair-coreRAIR: RAdare In Rust
Stars: ✭ 63 (-80.73%)
Malware SamplesA collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+163.91%)
ManalyzeA static analyzer for PE executables.
Stars: ✭ 701 (+114.37%)
ThreatKBKnowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)
Stars: ✭ 68 (-79.2%)
NorimaciNorimaci is a simple and lightweight malware analysis sandbox for macOS
Stars: ✭ 37 (-88.69%)
GonnacryA Linux Ransomware
Stars: ✭ 341 (+4.28%)
Malware IocIndicators of Compromises (IOC) of our various investigations
Stars: ✭ 955 (+192.05%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+2646.48%)
crusherNo description or website provided.
Stars: ✭ 21 (-93.58%)
UrsadbTrigram database written in C++, suited for malware indexing
Stars: ✭ 72 (-77.98%)
MalwoverviewMalwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, ThreatCrowd, Valhalla, Malware Bazaar, ThreatFox and it is able to scan Android devices against VT and HA.
Stars: ✭ 1,276 (+290.21%)
Malware scriptsVarious scripts for different malware families
Stars: ✭ 91 (-72.17%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-55.96%)
LisaSandbox for automated Linux malware analysis.
Stars: ✭ 177 (-45.87%)
Threat IntelArchive of publicly available threat INTel reports (mostly APT Reports but not limited to).
Stars: ✭ 252 (-22.94%)
Lazy importerlibrary for importing functions from dlls in a hidden, reverse engineer unfriendly way
Stars: ✭ 544 (+66.36%)
SaferwallA hackable malware sandbox for the 21st Century
Stars: ✭ 419 (+28.13%)
AndromedaAndromeda - Interactive Reverse Engineering Tool for Android Applications
Stars: ✭ 627 (+91.74%)
UrlextractorInformation gathering & website reconnaissance | https://phishstats.info/
Stars: ✭ 341 (+4.28%)
TeleratTelegram RAT written in Python
Stars: ✭ 56 (-82.87%)
maldetectDebian packaging of Linux Malware Detect (https://github.com/rfxn/linux-malware-detect)
Stars: ✭ 48 (-85.32%)
HabomalhunterHaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis and security assessment on the Linux system.
Stars: ✭ 627 (+91.74%)
MeltingPotA tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.
Stars: ✭ 23 (-92.97%)
MazewalkerToolkit for enriching and speeding up static malware analysis
Stars: ✭ 132 (-59.63%)
BapBinary Analysis Platform
Stars: ✭ 1,385 (+323.55%)
VX-APICollection of various malicious functionality to aid in malware development
Stars: ✭ 904 (+176.45%)
PEiDYet another implementation of PEiD with yara
Stars: ✭ 12 (-96.33%)
TweetFeedCollecting IOCs posted on Twitter
Stars: ✭ 181 (-44.65%)
FlorentinoFast Static File Analysis Framework
Stars: ✭ 92 (-71.87%)
Kernel-dll-injectorKernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module
Stars: ✭ 256 (-21.71%)
ioc-fangerFang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Stars: ✭ 47 (-85.63%)
WeDefend⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan
Stars: ✭ 23 (-92.97%)
python-icap-yaraAn ICAP Server with yara scanner for URL and content.
Stars: ✭ 50 (-84.71%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+106.73%)
aparoidStatic and dynamic Android application security analysis
Stars: ✭ 62 (-81.04%)
bonomenBONOMEN - Hunt for Malware Critical Process Impersonation
Stars: ✭ 42 (-87.16%)
threat-intelSignatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (-60.24%)
Mobile Security Framework MobsfMobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+3022.94%)
openbsd-selfhosted🐡 Shell script for self-hosting cloud, email, and git services
Stars: ✭ 41 (-87.46%)
assemblylineAssemblyLine 4 - File triage and malware analysis
Stars: ✭ 69 (-78.9%)
S1EMThis project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (-17.43%)
memscrimperCode for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"
Stars: ✭ 25 (-92.35%)
tapedrive[WIP] The selfhosted Podcast Archive
Stars: ✭ 28 (-91.44%)
r2yarar2yara - Module for Yara using radare2 information
Stars: ✭ 30 (-90.83%)
Static-Malware-AnalysesA open source Python script to perform static analysis on a Malware Binary File (portable executable).
Stars: ✭ 15 (-95.41%)
Vendor-Threat-Triage-LookupLookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.
Stars: ✭ 17 (-94.8%)