High Octane Triage Analysis
-
Updated
May 29, 2024 - Python
High Octane Triage Analysis
Assemblyline 4 PowerShell emulation and static analysis tool
The FLARE team's open-source tool to identify capabilities in executable files.
Malware Configuration And Payload Extraction
Analyze PDFs. With colors. And Yara.
Exploit Development and Reverse Engineering with GDB Made Easy
ToolChain using Symbolic Execution for Malware Analysis.
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
Web interface and APIs for Assemblyline 4
AssemblyLine 4: File triage and malware analysis
IntelOwl: manage your Threat Intelligence at scale
Assemblyline 4 File extraction service
Python client for Assemblyline 3 and 4 / Client python pour AssemblyLine 3 and 4
Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)
Analysis of malware signatures and their associated Common Vulnerabilities and Exposures (CVEs)
Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)
Assemblyline 4 network capture analysis service
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
Add a description, image, and links to the malware-analysis topic page so that developers can more easily learn about it.
To associate your repository with the malware-analysis topic, visit your repo's landing page and select "manage topics."