Tools and techniques for analyzing, reverse-engineering, and understanding malicious software.
Explore 259 curated tools and resources
A generator for YARA rules that creates rules from strings found in malware files while removing strings from goodware files.
Compact C framework for analyzing suspected malware documents and detecting exploits and embedded executables.
FLARE Obfuscated String Solver (FLOSS) automatically extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
A file analysis framework that automates the evaluation of files by running a suite of tools and aggregating the output.
Fernflower is an analytical decompiler for Java with command-line options and support for external classes.
Binary analysis and management framework for organizing malware and exploit samples.
Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.
Repository of YARA rules for Trellix ATR blogposts and investigations
Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.
ILSpy is the open-source .NET assembly browser and decompiler with various decompiler frontends and features.
Python wrapper for Android APK decompilation with various converter and decompiler options.
A script to detect and remove Canary Tokens with simple signature-based detections.
A collection of publicly available YARA rules for detecting and classifying malware.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.