QuickSand
Compact C framework for analyzing suspected malware documents and detecting exploits and embedded executables.
YARA is a tool aimed at helping malware researchers to identify and classify malware samples by creating descriptions of malware families based on textual or binary patterns through rules consisting of strings and boolean expressions. It allows for the creation of complex rules using wild-cards, case-insensitive strings, regular expressions, and special operators.
Compact C framework for analyzing suspected malware documents and detecting exploits and embedded executables.
Standalone graphical utility for viewing Java source codes from ".class" files.
Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.
A collection of Android Applications with malware analysis results
YARA rules for ProcFilter to detect malware and threats
A file analysis framework that automates the evaluation of files by running a suite of tools and aggregating the output.