Collection of malware persistence and hunting information. Be a persistent persistence hunter!
created at March 30, 2020, 1:52 p.m.
A framework for receiving and redistributing abuse feeds
created at Nov. 25, 2015, 12:35 p.m.
hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols
created at Aug. 31, 2015, 5:02 p.m.
Tool to help guess a files 256 byte XOR key by using frequency analysis
created at Jan. 22, 2013, 9:09 p.m.
EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.
created at Oct. 5, 2013, 8:59 p.m.
A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to speed up resolutions.
created at March 9, 2015, 6:52 a.m.
BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
created at Nov. 24, 2019, 9:35 p.m.
Reverse engineering tool for virtualization wrappers
created at June 28, 2013, 6:55 p.m.
Malware/IOC ingestion and processing engine
created at April 4, 2018, 10:05 p.m.
A modular Python application to pull intelligence about malicious files
created at Aug. 30, 2016, 5:35 p.m.
Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc.
created at Feb. 27, 2015, 1:28 a.m.
analyze a web-based network traffic 🕶 to detect central command and control servers
created at Aug. 23, 2016, 9:45 a.m.
Searches various online resources to try and get as much info about an IP/domain as possible.
created at Dec. 24, 2012, 5:50 p.m.
A Python library and command line tools to provide interactive log visualization.
created at Oct. 11, 2016, 3:33 p.m.
Malware Analysis Tool using Function Level Fuzzy Hashing
created at Sept. 18, 2015, 5:55 p.m.