Tools and techniques for analyzing, reverse-engineering, and understanding malicious software.
Explore 259 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Debugger and .NET assembly editor with advanced debugging features.
Microservice for scanning files with Yara
KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.
OCaml wrapper for YARA matching engine for malware identification
A tool that executes programs in memory from various sources
Automate the process of writing YARA rules based on executable code within malware.
A .Net wrapper library for the native Yara library with interoperability and portability features.
SwishDbgExt is a Microsoft WinDbg debugging extension that enhances debugging capabilities for kernel developers, troubleshooters, and security experts.
Explores malware interaction with Windows API and methods for detection and prevention.
GuardDog is a CLI tool for identifying malicious PyPI and npm packages through heuristics and Semgrep rules.
Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.
A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.
Cybersecurity tool merging DarunGrim's analysis algorithms, currently in internal testing for official release.
A serverless, real-time, and retroactive malware detection tool that scans files with YARA rules and alerts incident response teams.