C++ application that uses memory and code hooks to detect packers
created at April 15, 2015, 11:02 p.m.
A machine learning tool that ranks strings based on their relevance for malware analysis.
created at Sept. 5, 2019, 1:02 p.m.
ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.
created at May 24, 2016, 5:04 p.m.
Differential Analysis of Malware in Memory
created at Sept. 16, 2014, 5:32 p.m.
inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
created at April 29, 2011, 4:37 a.m.
Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time indicators of Linux malware. It allows one to inspect Linux malware before execution, during execution, and after execution (post-mortem analysis) by performing static, dynamic and memory analysis using open source tools
created at Nov. 21, 2015, 8:37 a.m.
Cross-language temporary (disposable/throwaway) email detection library. Covers 55 734+ fake email providers.
created at March 4, 2013, 3 p.m.
A Python RESTful API framework for online malware analysis and threat intelligence services.
created at Feb. 27, 2015, 10:43 p.m.
Collection of almost 40.000 javascript malware samples
created at May 7, 2017, 7:17 p.m.
Web interface for the Volatility Memory Forensics Framework
created at April 14, 2015, 1:26 a.m.
Machinae Security Intelligence Collector
created at July 6, 2015, 3:14 p.m.
Robust ABC (ActionScript Bytecode) [Dis-]Assembler
created at May 5, 2010, 7:23 a.m.