A framework for receiving and redistributing abuse feeds
updated at Jan. 23, 2024, 11:37 a.m.
BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
updated at Jan. 27, 2024, 5:39 a.m.
Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds
updated at Jan. 30, 2024, 4:14 a.m.
DEPRECATED - USE v3 (bearded-avenger)
updated at Feb. 4, 2024, 7:58 a.m.
inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
updated at Feb. 5, 2024, 5:10 p.m.
analyze a web-based network traffic 🕶 to detect central command and control servers
updated at Feb. 8, 2024, 8:56 p.m.
A modular Python application to collect intelligence for malicious hosts.
updated at Feb. 9, 2024, 5:33 p.m.
hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols
updated at Feb. 18, 2024, 8:27 p.m.
Tool to help guess a files 256 byte XOR key by using frequency analysis
updated at Feb. 24, 2024, 11:41 a.m.
Robust ABC (ActionScript Bytecode) [Dis-]Assembler
updated at March 8, 2024, 5:20 a.m.
An ICAP Server with yara scanner for URL and content.
updated at March 12, 2024, 12:41 p.m.
A modular Python application to pull intelligence about malicious files
updated at March 20, 2024, 12:49 a.m.
Malware static analysis framework
updated at March 24, 2024, 12:15 a.m.