260 tools and resources
Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Reach out!
A malware/botnet analysis framework with a focus on network analysis and process comparison.
A collection of Yara rules for identifying malicious PEs with unique or suspicious PDB paths.
Dynamic binary analysis library with various analysis and emulation capabilities.
Copy executables with execute, but no read permission on Unix systems.
An advanced cross-platform tool for detecting and exploiting SQL injection security flaws
A tool that generates pseudo-malicious files to trigger YARA rules.
A portable version of XSSHunter.com for finding and exploiting Cross-Site Scripting (XSS) vulnerabilities.
Pwndbg is a GDB plug-in that enhances the debugging experience for low-level software developers, hardware hackers, reverse-engineers, and exploit developers.
A Scriptable Android Debugger for reverse engineers and developers.
YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.
Generates a YARA rule to match basic blocks of the current function in IDA Pro
A tool that scans a corpus of malware and builds a YARA rule to detect similar code sections.
A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.
A collection of Yara rules for detecting malware evasion techniques
Automates the process of preparing Android APK files for HTTPS inspection
A project providing open-source YARA rules for malware and malicious file detection
Java decompiler for modern Java features up to Java 14.
A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.
Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.
A collection of resources for beginners to learn assembly language.
A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.