Malware SamplesA collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+110.49%)
MalboxesBuilds malware analysis Windows VMs so that you don't have to.
Stars: ✭ 900 (+119.51%)
WinappdbgWinAppDbg Debugger
Stars: ✭ 338 (-17.56%)
SeeSandboxed Execution Environment
Stars: ✭ 770 (+87.8%)
vminspectTools for inspecting disk images
Stars: ✭ 25 (-93.9%)
Awesome RatRAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Stars: ✭ 759 (+85.12%)
Practical Malware AnalysisMaterials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (-96.1%)
XlmmacrodeobfuscatorExtract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)
Stars: ✭ 243 (-40.73%)
PinctfUsing Intel's PIN tool to solve CTF problems
Stars: ✭ 399 (-2.68%)
Xia0lldbLLDB python scripts for iOS arm64 reversing by xia0
Stars: ✭ 299 (-27.07%)
rtfsigA tool to help malware analysts signature unique parts of RTF documents
Stars: ✭ 28 (-93.17%)
Vba2graphVba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.
Stars: ✭ 245 (-40.24%)
SpeakeasyWindows kernel and user mode emulation.
Stars: ✭ 605 (+47.56%)
apkutila useful utility for android app security testing
Stars: ✭ 52 (-87.32%)
AntivmdetectionScript to create templates to use with VirtualBox to make vm detection harder
Stars: ✭ 527 (+28.54%)
Malware ResearchCode written as part of our various malware investigations
Stars: ✭ 281 (-31.46%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (-27.56%)
coranaCorana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) of IoT malware under the presence of obfuscation techniques e.g., indirect jumps and opaque predicates
Stars: ✭ 19 (-95.37%)
NaoSimple No-meaning Assembly Omitter for IDA Pro (This is just a prototype)
Stars: ✭ 228 (-44.39%)
WdbgarkWinDBG Anti-RootKit Extension
Stars: ✭ 450 (+9.76%)
Malware analysisVarious snippets created during malware analysis
Stars: ✭ 413 (+0.73%)
binlexA Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (-26.1%)
PokeredDisassembly of Pokémon Red/Blue
Stars: ✭ 2,924 (+613.17%)
Yolo😈Scripts or demo projects on iOS development or reverse engineering
Stars: ✭ 245 (-40.24%)
RopgadgetThis tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
Stars: ✭ 2,908 (+609.27%)
UnipackerAutomatic and platform-independent unpacker for Windows binaries based on emulation
Stars: ✭ 273 (-33.41%)
Vac BypassValve Anti-Cheat bypass written in C.
Stars: ✭ 241 (-41.22%)
xLoggerSimple windows API logger
Stars: ✭ 62 (-84.88%)
RecafThe modern Java bytecode editor
Stars: ✭ 3,374 (+722.93%)
BluefluffReverse Engineering Furby Connect's Bluetooth Protocol and Update Format
Stars: ✭ 348 (-15.12%)
OsweepDon't Just Search OSINT. Sweep It.
Stars: ✭ 225 (-45.12%)
python-icap-yaraAn ICAP Server with yara scanner for URL and content.
Stars: ✭ 50 (-87.8%)
Threat HuntingPersonal compilation of APT malware from whitepaper releases, documents and own research
Stars: ✭ 219 (-46.59%)
Invtero.netinVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
Stars: ✭ 237 (-42.2%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-85.37%)
SenseyeDynamic Visual Debugging / Reverse Engineering Toolsuite
Stars: ✭ 234 (-42.93%)
MicrocodeMicrocode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode
Stars: ✭ 268 (-34.63%)
Dmg Cpu InsideReverse-engineered schematics for DMG-CPU-B
Stars: ✭ 230 (-43.9%)
learning-malware-analysisThis repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to worry about handling live malware.
Stars: ✭ 124 (-69.76%)
Uefi retoolA tool for UEFI firmware reverse engineering
Stars: ✭ 227 (-44.63%)
EngineDroidefense: Advance Android Malware Analysis Framework
Stars: ✭ 386 (-5.85%)
AndroidautoidriveImplementations of some Android Auto features as unofficial IDrive apps
Stars: ✭ 226 (-44.88%)
Frickfrick - aka the first debugger built on top of frida
Stars: ✭ 267 (-34.88%)
Vscode FridaUnofficial frida extension for VSCode
Stars: ✭ 221 (-46.1%)
telfhashSymbol hash for ELF files
Stars: ✭ 75 (-81.71%)
JpsxdecjPSXdec: cross-platform PlayStation 1 audio and video converter
Stars: ✭ 219 (-46.59%)
Pikachu VolleyballPikachu Volleyball implemented into JavaScript by reverse engineering the original game
Stars: ✭ 324 (-20.98%)
binary-decompilationExtracting high level semantic information from binary code
Stars: ✭ 55 (-86.59%)
Gta ReversedReversed code of GTA:SA executable (gta_sa.exe) 1.0 US
Stars: ✭ 297 (-27.56%)
DrCCTProfDrCCTProf is a fine-grained call path profiling framework for binaries running on ARM and X86 architectures.
Stars: ✭ 81 (-80.24%)
malice-avMalice AntiVirus Plugins
Stars: ✭ 98 (-76.1%)
Attack monitorEndpoint detection & Malware analysis software
Stars: ✭ 186 (-54.63%)
inoIn 'n Out - See what goes in and comes out of PEs
Stars: ✭ 28 (-93.17%)
FclFCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (-0.24%)