8. apooxmlGenerate YARA rules for OOXML documents.
9. jitmJITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.
10. remote lookupResolves DLL API entrypoints for a process w/ remote query capabilities.
11. rvmi-rekallRekall Forensics and Incident Response Framework with rVMI extensions
13. flare-dbgflare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.
20. stringsifterA machine learning tool that ranks strings based on their relevance for malware analysis.
23. ThreatPursuit-VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
26. SilkETWNo description, website, or topics provided.
28. flashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
37. FIDLA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research