Malware Configuration And Payload Extraction
-
Updated
Jun 4, 2024 - Python
Malware Configuration And Payload Extraction
Python scripts for Malware Bazaar
AssemblyLine 4: File triage and malware analysis
Pyhidra is a Python library that provides direct access to the Ghidra API within a native CPython interpreter using jpype.
A set of API's to catalog sets of saved-searches for the purpose of contextualizing research efforts & results. Batteries not included.
A modular malware analysis framework built with a graph database
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detection
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Radare2 Metadata Extraction to Elasticsearch
Malware repository component for samples & static configuration with REST API interface.
A tool to ingest static malware analysis tool output at scale
Distributed malware processing framework based on Python, Redis and S3.
Python implementation of the Packed Executable iDentifier (PEiD)
Code written as part of our various malware investigations
This repository contains indicators of compromise (IOCs) of our various investigations.
A Python VBScript Code Obfuscator
Capa-ta leverages the Capa tool and VT API to detect capabilities in executable files
FAME Automates Malware Evaluation
Collaborative malware exchange repository.
Add a description, image, and links to the malware-research topic page so that developers can more easily learn about it.
To associate your repository with the malware-research topic, visit your repo's landing page and select "manage topics."