static file analysisAnalysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
Stars: ✭ 34 (-51.43%)
EngineDroidefense: Advance Android Malware Analysis Framework
Stars: ✭ 386 (+451.43%)
SaferwallA hackable malware sandbox for the 21st Century
Stars: ✭ 419 (+498.57%)
FlorentinoFast Static File Analysis Framework
Stars: ✭ 92 (+31.43%)
PanopticonA libre cross-platform disassembler.
Stars: ✭ 1,376 (+1865.71%)
BapBinary Analysis Platform
Stars: ✭ 1,385 (+1878.57%)
MazewalkerToolkit for enriching and speeding up static malware analysis
Stars: ✭ 132 (+88.57%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+627.14%)
Sbt Dependency CheckSBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (+167.14%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (-40%)
OpenctiAuthors
Stars: ✭ 2,165 (+2992.86%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-77.14%)
Radare2UNIX-like reverse engineering framework and command-line toolset
Stars: ✭ 15,412 (+21917.14%)
ReplicaGhidra Analysis Enhancer 🐉
Stars: ✭ 194 (+177.14%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+322.86%)
MalScanA Simple PE File Heuristics Scanners
Stars: ✭ 41 (-41.43%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-72.86%)
OblivionData leak checker & OSINT Tool
Stars: ✭ 237 (+238.57%)
Mobile Security Framework MobsfMobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+14488.57%)
Befa LibraryHigh-level library for executable binary file analysis
Stars: ✭ 12 (-82.86%)
HabomalhunterHaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis and security assessment on the Linux system.
Stars: ✭ 627 (+795.71%)
cheatsheetThese are some of the commands which I use frequently during Malware Analysis and DFIR.
Stars: ✭ 23 (-67.14%)
decrypticonJava-layer Android Malware Simplifier
Stars: ✭ 17 (-75.71%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-51.43%)
WeDefend⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan
Stars: ✭ 23 (-67.14%)
connectorsOpenCTI connectors
Stars: ✭ 135 (+92.86%)
SDASDA is a rich cross-platform tool for reverse engineering that focused firstly on analysis of computer games. I'm trying to create a mix of the Ghidra, Cheat Engine and x64dbg. My tool will combine static and dynamic analysis of programs. Now SDA is being developed.
Stars: ✭ 98 (+40%)
tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-48.57%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-52.86%)
toolkitThe essential toolkit for reversing, malware analysis, and cracking
Stars: ✭ 176 (+151.43%)
aparoidStatic and dynamic Android application security analysis
Stars: ✭ 62 (-11.43%)
auroraMalware similarity platform with modularity in mind.
Stars: ✭ 70 (+0%)
qvm-create-windows-qubeSpin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+281.43%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-45.71%)
assemblylineAssemblyLine 4 - File triage and malware analysis
Stars: ✭ 69 (-1.43%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+865.71%)
bonomenBONOMEN - Hunt for Malware Critical Process Impersonation
Stars: ✭ 42 (-40%)
dummyDLLUtility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-50%)
BootsyDesigned to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
Stars: ✭ 33 (-52.86%)
TweetFeedCollecting IOCs posted on Twitter
Stars: ✭ 181 (+158.57%)
bluepillBluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (+34.29%)
binlexA Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (+332.86%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (+324.29%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+118.57%)
Practical Malware AnalysisMaterials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (-77.14%)
REW-sploitEmulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+64.29%)
adalancheActive Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (+1131.43%)
yaraMalice Yara Plugin
Stars: ✭ 27 (-61.43%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-40%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+21.43%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+5207.14%)
malware-writeupsPersonal research and publication on malware families
Stars: ✭ 104 (+48.57%)