Inlyse Logo

Inlyse

0
Commercial
Visit Website

INLYSE Malware Protection is a cutting-edge AI-based IT security platform that identifies malware and cyber-attacks within seconds. It uses intelligent picture recognition mechanisms with self-learning neural networks to identify and stop advanced malware, zero-day exploits, and APT attacks without regular updates. The platform converts files into graphical representations and checks whether malware is contained or not. It uses a universal preprocessing pipeline to disassemble any input data into its type-specific segments and encodes the containing correlating data structures in the best possible way to an expressive graphical representation of the specific segment. The INLYSE platform includes a scan engine that bridges the gap that antivirus solutions do not match, and a base engine that provides centralized management of the INLYSE Security Ecosystem. The platform also includes plugins for application security, mail security, and browser security, allowing users to scan downloads against malware before downloading them, visit websites that are scanned against phishing, malicious links, and validated SSL certificates, and expand their email security.

FEATURES

ALTERNATIVES

A de-obfuscator for M/o/Vfuscator, a notorious obfuscator, designed to reverse the effects of M/o/Vfuscator's obfuscation.

A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.

Redexer is a reengineering tool for Android app binaries with features like RefineDroid and Dr. Android.

A library for running basic functions from stripped binaries cross platform.

Studying Android malware behaviors through Information Flow monitoring techniques.

Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.

A tool to fuzz query strings and identify vulnerabilities

GuardDog is a CLI tool for identifying malicious PyPI and npm packages through heuristics and Semgrep rules.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved