malware-analysis
Here are 518 public repositories matching this topic...
Defund the Police.
-
Updated
Jun 15, 2020
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
-
Updated
Jun 14, 2020 - Python
I am not sure how I should make such a request and forgive me if this is the incorrect way to ask.
How can I get a copy of the Petya document that was in the word document spread via MeDoc?
I have seen some links but they're dead and I cannot access them.
Does anyone have a copy ?
Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
-
Updated
Jun 11, 2020
Right now the process isn't documented and is done by calling different classes in the project. Make a gradle task and document it a bit to make it easier for people to update it themselves.
Related discussion: CalebFenton/simplify#57
GEF - GDB Enhanced Features for exploit devs & reversers
-
Updated
Jun 14, 2020 - Python
As of GDB 8.3 RISCV is supported.hope add basic support for RISC-V
Hello everyone!
I have a few doubts on how events are handled across misp instances and Orgs. As I still haven't complete domain of the code and my curiosity is killing me, I'm coming here to ask help =]
- In the situation a site admin edit an event from another org and publish it. What exactly will happen with that information? Supposing it has a distribution level as "All communities".
Wil
-
Updated
May 26, 2020 - PowerShell
LIEF - Library to Instrument Executable Formats
-
Updated
Jun 6, 2020 - C++
Program for determining types of files for Windows, Linux and MacOS.
-
Updated
Jun 5, 2020 - YARA
In the documentation https://github.com/decalage2/oletools/wiki/olevba, it says "MS Office files encrypted with a password are also supported, because VBA macro code is never encrypted, only the content of the document". This makes me think, for an encrypted office file, olevba can extract the macro with or without a password provided. However, this is not the case. olevba seems only extracts the
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
-
Updated
Jun 15, 2020 - C++
FakeNet-NG - Next Generation Dynamic Network Analysis Tool
-
Updated
Jun 12, 2020 - Python
A curated list of awesome YARA rules, tools, and people.
-
Updated
May 18, 2020
Malcom - Malware Communications Analyzer
-
Updated
Nov 29, 2017 - Python
There may be some overlap with other signatures, need to verify these samples are 100% independent;
3f98e8d89e42ecafadb529e96c8305707c4a42d9ca97500b91b8da2fc93e07c3
b7a0d51599ff8955f0f77bd946c92433d5241e14fa84e6cbe49e0ad98898ad94
d64e1e2d0847becd4a4cd9c5804e42093719c77c15b2560c2c8bc993e90dda3b
963ee42c96a25f4a5413d8c4c455575e473516aa58c55b575e86a4fbae4aa3aa
bd6d7d8e519a3ba240d8a18d1b22
Sandboxed Execution Environment
-
Updated
Apr 7, 2020 - Python
A collection of malware samples caught by several honeypots i manage
-
Updated
Jul 11, 2019
yarGen is a generator for YARA rules
-
Updated
Aug 10, 2019 - Python
FAME Automates Malware Evaluation
-
Updated
May 28, 2020 - Python
makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]
-
Updated
Mar 17, 2019 - C++
Parsing error on this sample: https://app.any.run/tasks/2be2b38f-4de2-4b48-8ae5-67bda9eecbaf
-------------------------------------------------------------------------------
PARSING VBA CODE:
INFO parsed Sub z55e6df583 ([ByVal s2b7d47c629 as String]): 14 statement(s)
INFO parsed Sub Document_Open (): 5 statement(s)
INFO parsed Function tfaca84885f ([ByVal zd77f34558c as Varian
HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis and security assessment on the Linux system.
-
Updated
Oct 13, 2019 - Python
DRAKVUF Black-box Binary Analysis
-
Updated
Jun 14, 2020 - C
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
-
Updated
Feb 17, 2020
Improve this page
Add a description, image, and links to the malware-analysis topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the malware-analysis topic, visit your repo's landing page and select "manage topics."


Extended Binary Coded Decimal Interchange Code (EBCDIC; /ˈɛbsɪdɪk/) is an eight-bit character encoding used mainly on IBM mainframe and IBM midrange computer operating systems. It descended from the code used with punched cards and the corresponding six-bit binary-coded decimal code used with most of IBM's computer peripherals of the late 1950s and early 196