Malware Configuration And Payload Extraction
-
Updated
May 21, 2024 - Python
Malware Configuration And Payload Extraction
Exploit Development and Reverse Engineering with GDB Made Easy
enumerate binary capabilities, including malicious behaviors
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
This repo contains IOC, malware and malware analysis associated with Public cloud
Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.
USB Scanning device
LIEF - Library to Instrument Executable Formats
Verdict-as-a-Service SDKs: Analyze files for malicious content
The FLARE team's open-source tool to identify capabilities in executable files.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Do DFIR work in Windows Sandbox
Malware repository component for samples & static configuration with REST API interface.
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
This repository contains various malware and ransomware samples for research and analysis purposes.
MalwareDB: bookkeeping for malware, goodware, and unknown files with relationship discovery
This repository is a collection of reports of malicious packages.
Radare2 snap and docker repository
UNIX-like reverse engineering framework and command-line toolset
APK/DEX detector for Windows, Linux and MacOS.
Add a description, image, and links to the malware-analysis topic page so that developers can more easily learn about it.
To associate your repository with the malware-analysis topic, visit your repo's landing page and select "manage topics."