4. Capa RulesStandard collection of rules for capa: the tool for enumerating the capabilities of programs
5. GeologonalyzerGeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.
7. Flare FlossFLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
8. Flare QdbCommand-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.
9. Flare Dbgflare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.
11. FlashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
12. CapaThe FLARE team's open-source tool to identify capabilities in executable files.
17. GocrackGoCrack is a management frontend for password cracking tools written in Go
18. Threatpursuit VmThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
24. StringsifterA machine learning tool that ranks strings based on their relevance for malware analysis.
28. RvmirVMI - A New Paradigm For Full System Analysis
30. FidlA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
33. IdawasmIDA Pro loader and processor modules for WebAssembly
36. poundThe Pound program is a reverse proxy, load balancer and HTTPS front-end for Web server(s).
39. toolsgeneral purpose and malware specific analysis tools
40. cWMIThis project is a lightweight wrapper for interacting with WMI using python/ctypes