Interactive malware hunting service with live access to the heart of an incident, providing real-time interaction, network tracking, process monitoring, MITRE ATT&CK™ mapping, behavior graph, and more. Trusted by over 440,000 individual researchers, it offers an innovative cloud-based sandbox with full interactive access for in-depth analysis.
FEATURES
SIMILAR TOOLS
A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.
A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.
A collection of YARA rules for public use, built from intelligence profiles and file work.
An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.
A simple Python script to test for a hypothetical JWT vulnerability
A tool for reading Portable Executable (PE) files with detailed information about the file structure.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.