malware-analysis
Here are 578 public repositories matching this topic...
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
-
Updated
Nov 24, 2020 - Python
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
-
Updated
Nov 27, 2020
Defund the Police.
-
Updated
Oct 11, 2020
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
-
Updated
Nov 23, 2020 - Python
Android virtual machine and deobfuscator
-
Updated
Nov 20, 2020 - Java
GEF - GDB Enhanced Features for exploit devs & reversers
-
Updated
Nov 26, 2020 - Python
Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions
Problem in MISP/app/Lib/Export/NidsExport.php /
causes there are two rows in beggening of all rules regarding email. Bug is in row 161
case 'email':
$this->emailSrcRule($ruleFormat, $item['Attribute'], $sid);
$this->emailDstRule($ruleFormat, $item['Attribute'], $sid);
break;
this causes inserting both source and destinati
-
Updated
Nov 17, 2020 - PowerShell
LIEF - Library to Instrument Executable Formats
-
Updated
Nov 28, 2020 - C++
Program for determining types of files for Windows, Linux and MacOS.
-
Updated
Nov 19, 2020 - JavaScript
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
-
Updated
Nov 27, 2020 - Python
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
-
Updated
Nov 15, 2020 - Rich Text Format
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
-
Updated
Oct 19, 2020 - C++
A curated list of awesome YARA rules, tools, and people.
-
Updated
Nov 24, 2020
VirusTotal Wanna Be - Now with 100% more Hipster
-
Updated
Mar 18, 2019 - Go
The FLARE team's open-source tool to identify capabilities in executable files.
-
Updated
Nov 23, 2020 - Python
[Suspended] FakeNet-NG - Next Generation Dynamic Network Analysis Tool
-
Updated
Nov 11, 2020 - Python
GDA is a new fast and powerful decompiler for the APK, DEX, ODEX, OAT, JAR, AAR and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, data decryption and encryption etc.
-
Updated
Nov 25, 2020 - Python
Malcom - Malware Communications Analyzer
-
Updated
Nov 29, 2017 - Python
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
-
Updated
Nov 20, 2020 - YARA
A collection of malware samples caught by several honeypots i manage
-
Updated
Sep 30, 2020
Sandboxed Execution Environment
-
Updated
Oct 5, 2020 - Python
yarGen is a generator for YARA rules
-
Updated
Oct 12, 2020 - Python
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
-
Updated
Feb 17, 2020
FAME Automates Malware Evaluation
-
Updated
Nov 12, 2020 - Python
Improve this page
Add a description, image, and links to the malware-analysis topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the malware-analysis topic, visit your repo's landing page and select "manage topics."


Currently it's possible to list possible variable values in the CLI with
e search.in=?.But in
Vevisual configuration options navigator the feature is missing: