The FLARE team's open-source tool to identify capabilities in executable files.
-
Updated
Oct 14, 2024 - Python
The FLARE team's open-source tool to identify capabilities in executable files.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
VirusTotal Client for MalwareDB (and other projects too!)
UNIX-like reverse engineering framework and command-line toolset
APK/DEX detector for Windows, Linux and MacOS.
Linker/Compiler/Tool detector for Windows, Linux and MacOS.
Sanctum is a proof-of-concept EDR like tool, designed to detect modern malware techniques, above and beyond the capabilities of antivirus. Built in Rust.
Live malware samples and database, daily update.
Samples used for developing and testing malcontent rules.
Malware Configuration And Payload Extraction
This repository is a collection of reports of malicious packages.
Exploit Development and Reverse Engineering with GDB Made Easy
All CTFs solved in Offensive and Defensive Cyber Security course of Polytechnic of Milan 23/24 edition
Awesome collection of resources 😎 Work in progress🔥
re-kit 2.0 is a reverse engineering toolkit made for fighting malware and analyzing programs.
Virus - Trojans - Worms - Malwares
Radare2 snap and docker repository
This repo contains IOC, malware and malware analysis associated with Public cloud
A Scoop bucket for applications that I always include in my malware analysis workstations
the paranoid open-source malware scanner
Add a description, image, and links to the malware-analysis topic page so that developers can more easily learn about it.
To associate your repository with the malware-analysis topic, visit your repo's landing page and select "manage topics."