Tools and techniques for analyzing, reverse-engineering, and understanding malicious software.
Explore 259 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A tool for reading Portable Executable (PE) files with detailed information about the file structure.
A Python script that converts shellcode into a PE32 or PE32+ file.
Python wrapper for the Libemu library for analyzing shellcode.
A tool that generates Yara rules for strings and their XOR encoded versions, as well as base64-encoded variations with different padding possibilities.
A tool for reverse engineering Android apk files.
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
Scan folders and files for crypto patterns, hacking team malware, and malicious documents using PEID signatures.
A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.
A standalone binary inspection tool for Android developers with support for various formats and dependencies.
Code to prevent a managed .NET debugger/profiler from working.
Collection of Python scripts for automating tasks and enhancing IDA Pro functionality
Automatic analysis of malware behavior using machine learning.
A library of PHP unserialize() payloads and a tool to generate them.
A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.