XapkdetectorAPK/DEX detector for Windows, Linux and MacOS.
Stars: ✭ 208 (+131.11%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+103.33%)
ssdcssdeep cluster analysis for malware files
Stars: ✭ 24 (-73.33%)
Shed.NET runtime inspector
Stars: ✭ 229 (+154.44%)
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+2248.89%)
WeDefend⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan
Stars: ✭ 23 (-74.44%)
MalwaresearchA command line tool to find malwares on http://openmalware.org
Stars: ✭ 190 (+111.11%)
assemblyline-coreCore server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)
Stars: ✭ 16 (-82.22%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (+78.89%)
DrsemuDrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior
Stars: ✭ 237 (+163.33%)
KartonDistributed malware processing framework based on Python, Redis and MinIO.
Stars: ✭ 134 (+48.89%)
bonomenBONOMEN - Hunt for Malware Critical Process Impersonation
Stars: ✭ 42 (-53.33%)
OsweepDon't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+150%)
learning-malware-analysisThis repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to worry about handling live malware.
Stars: ✭ 124 (+37.78%)
CmulatorCmulator is ( x86 - x64 ) Scriptable Reverse Engineering Sandbox Emulator for shellcode and PE binaries . Based on Unicorn & Zydis Engine & javascript
Stars: ✭ 197 (+118.89%)
aparoidStatic and dynamic Android application security analysis
Stars: ✭ 62 (-31.11%)
Detect It EasyProgram for determining types of files for Windows, Linux and MacOS.
Stars: ✭ 2,982 (+3213.33%)
xLoggerSimple windows API logger
Stars: ✭ 62 (-31.11%)
AntidbgA bunch of Windows anti-debugging tricks for x86 and x64.
Stars: ✭ 177 (+96.67%)
angr-antievasionFinal project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).
Stars: ✭ 35 (-61.11%)
Docker MispAutomated Docker MISP container - Malware Information Sharing Platform and Threat Sharing
Stars: ✭ 148 (+64.44%)
toolkitThe essential toolkit for reversing, malware analysis, and cracking
Stars: ✭ 176 (+95.56%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (+60%)
Flare VmNo description or website provided.
Stars: ✭ 3,201 (+3456.67%)
Vba2graphVba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.
Stars: ✭ 245 (+172.22%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (+46.67%)
assemblylineAssemblyLine 4 - File triage and malware analysis
Stars: ✭ 69 (-23.33%)
NaoSimple No-meaning Assembly Omitter for IDA Pro (This is just a prototype)
Stars: ✭ 228 (+153.33%)
bluepillBluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (+4.44%)
Radare2UNIX-like reverse engineering framework and command-line toolset
Stars: ✭ 15,412 (+17024.44%)
Threat HuntingPersonal compilation of APT malware from whitepaper releases, documents and own research
Stars: ✭ 219 (+143.33%)
LiefAuthors
Stars: ✭ 2,730 (+2933.33%)
cheatsheetThese are some of the commands which I use frequently during Malware Analysis and DFIR.
Stars: ✭ 23 (-74.44%)
ReplicaGhidra Analysis Enhancer 🐉
Stars: ✭ 194 (+115.56%)
ApkfileAndroid app analysis and feature extraction library
Stars: ✭ 190 (+111.11%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-80%)
Attack monitorEndpoint detection & Malware analysis software
Stars: ✭ 186 (+106.67%)
binlexA Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (+236.67%)
ProbedroidA SDK for the creation of analysis tools without obtaining app source code in order to profile runtime performance, examine code coverage, and track high-risk behaviors of a given app on Android 5.0 and above.
Stars: ✭ 182 (+102.22%)
LisaSandbox for automated Linux malware analysis.
Stars: ✭ 177 (+96.67%)
telfhashSymbol hash for ELF files
Stars: ✭ 75 (-16.67%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+212.22%)
ApiscoutThis project aims at simplifying Windows API import recovery on arbitrary memory dumps
Stars: ✭ 146 (+62.22%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+21.11%)
Nauz File DetectorLinker/Compiler/Tool detector for Windows, Linux and MacOS.
Stars: ✭ 146 (+62.22%)
Kernel-dll-injectorKernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module
Stars: ✭ 256 (+184.44%)
BashacksSet of functions to increase productivity while hacking with Bash
Stars: ✭ 138 (+53.33%)
emeraldImport DynamoRIO drcov code coverage data into Ghidra
Stars: ✭ 30 (-66.67%)
Pepper An open source script to perform malware static analysis on Portable Executable
Stars: ✭ 250 (+177.78%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-33.33%)
Guanciale🥓 Grab info needed by Carbonara from executables and disassemblers databases
Stars: ✭ 14 (-84.44%)
XlmmacrodeobfuscatorExtract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)
Stars: ✭ 243 (+170%)