Malware Analysis

259 tools and resources

Tags in this Category

FEATURED

Feature Your Cybersecurity Product

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Boost Your Visibility

NEW

ICSREF is a modular framework for automated reverse engineering of industrial control systems binaries

Leading open source automated malware analysis system.

Educational resources for reverse engineering tutorials by lena151.

Java decompiler GUI tool for Procyon under Apache License.

A multithreaded YARA scanner for incident response or malware zoos.

A collaborative malware analysis framework with various features for automated analysis tasks.

A Python library to interface with a cuckoo-modified instance.

A generator for YARA rules that creates rules from strings found in malware files while removing strings from goodware files.

Compact C framework for analyzing suspected malware documents and detecting exploits and embedded executables.

FLARE Obfuscated String Solver (FLOSS) automatically extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.

A file analysis framework that automates the evaluation of files by running a suite of tools and aggregating the output.

Fernflower is an analytical decompiler for Java with command-line options and support for external classes.

Binary analysis and management framework for organizing malware and exploit samples.

Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.

Repository of YARA rules for Trellix ATR blogposts and investigations

Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.

ILSpy is the open-source .NET assembly browser and decompiler with various decompiler frontends and features.

A tool for processing compiled YARA rules in IDA.

APKX Logo
0.0

Python wrapper for Android APK decompilation with various converter and decompiler options.

A script to detect and remove Canary Tokens with simple signature-based detections.

A collection of publicly available YARA rules for detecting and classifying malware.

1011
12
13