Tools and techniques for analyzing, reverse-engineering, and understanding malicious software. Task: Python
Explore 17 curated tools and resources
VMCloak is a tool for creating and preparing Virtual Machines for Cuckoo Sandbox.
Dynamic binary analysis library with various analysis and emulation capabilities.
A Scriptable Android Debugger for reverse engineers and developers.
A semi-automatic tool to generate YARA rules from virus samples.
A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.
A suite of secret scanners built in Rust for performance.
A program to extract IOCs from text files using regular expressions
A Python-based tool for detecting XSS vulnerabilities
KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.
A native Python cross-version decompiler and fragment decompiler.
OCyara performs OCR on image files and scans them for matches to Yara rules, supporting Debian-based Linux distros.
Python wrapper for the Libemu library for analyzing shellcode.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.