Title: Tools for Identifying and Managing GitHub Malware โ Malware
Content: GitHub has emerged as a significant resource for developers, but it also contains risks related to
Recommendation
This is a resource found on GitHub for conducting malware analysis, and it is very comprehensive. I hope it helps those engaged in malware detection.
Comprehensive Collection of Malware Analysis
Project Address:
https://github.com/rshipp/awesome-malware-analysis
This list catalogs commendable malware analysis tools and resources.
- Collection of Malware
- Anonymous Proxy
- Honeypot
- Malware Sample Repository
- Open Source Threat Intelligence
- Tools
- Other Resources
- Detection and Classification
- Online Scanning and Sandboxing
- Domain Analysis
- Browser Malware
- Documents and Shellcode
- File Extraction
- Deobfuscate
- Debugging and Reverse Engineering
- Network
- Memory Forensics
- Windows Ultimate Tool
- Storage and Workflow
- The content of the post seems to be labeled simply as โMiscellaneous.โ If this is a placeholder or unspecified text, please provide more context or specific content that needs translation. If this is indeed the content, consider expanding it with details so I can offer a precise translation while preserving HTML integrity.
- Resources
- books
- It seems that the provided text is not in English. If you could provide the content in English, I would be able to assist you with translating the WordPress post using my specialized knowledge. Please
- Relevant Awesome List
- The term โ่ดก็ฎ่ โ translates to โContributorsโ in American English. If you have any specific WordPress post content youโd like translated while maintaining the HTML structure, feel free to share it!
- Acknowledgments
Malware Collection
Anonymous Proxy
Web Traffic Anonymization Schemes for Analysts
- Anonymouse.org โ A Free, Web-Based Anonymous Proxy
- OpenV** โ V** Software and Hosting Solutions
- Privoxy โ An open-source proxy server with privacy protection features
- Tor โ Onion Router, designed to prevent leaving a client IP address while browsing the web.
Honeypot
Capture and Collect Your Own Samples
- Conpot โ ICS/SCADA Honeypot
- Cowrie โ An SSH Honeypot Based on Kippo
- DemoHunter โ Low-Interaction Distributed Honeypot
- Dionaea โ A honeypot used for capturing malware
- Glastopf โ Web Application Honeypot
- Honeyd โ Creating a Virtual Honeypot
- HoneyDrive โ A Linux Distribution for Honeypot Deployment
- Mnemosyne โ Honeypot Data Standardization Powered by Dionaea
- Thug โ A Low-Interaction Honeypot Used to Investigate Malicious Websites
Malware Sample Repository
Collect malware samples for analysis
- Clean MX โ Real-Time Database of Malware and Malicious Domains
- Contagio โ A Recent Collection of Malware Samples and Analysis
- Exploit Database โ Exploit and shellcode samples
- Infosec โ CERT-PA โ Collection and Analysis of Malware Samples
- Malpedia โ Provides Quickly Identifiable and Actionable Contextual Resources for Investigating Malware
- Malshare โ A Vast Repository of Malicious Samples Obtained from Malicious Websites
- MalwareDB โ Malware Sample Database
- Open Malware Project โ Sample Information and Download
- Ragpicker โ A Plugin Based on a Malware Crawler
- theZoo โ Real-time Malware Repository for Analysts
- Tracker h3x โ Aggregatorโs Malicious Software Tracking and Download Addresses
- vduddu malware repo โ A Collection of Various Malware Files and Source Codes
- VirusBay โ A Community-Based Malware Repository
- ViruSign โ A Database of Malware Detected by Antivirus Programs Other Than ClamAV
- VirusShare โ Malware Repository
- VX Vault โ Proactive Collection of Malware Samples
- Zeltserโs Sources โ A curated list of malware sample sources by Lenny Zeltser
- Zeus Source Code โ 2011 Zeus source code leak
Open Source Threat Intelligence
Tools
Collecting and Analyzing IOC Information
- AbuseHelper โ An Open-Source Framework for Receiving and Redistributing Threat Intelligence
- AlienVault Open Threat Exchange โ Sharing and Collaboration in Threat Intelligence
- Combine โ Obtaining Threat Intelligence Information from Open Sources
- Fileintel โ File Intelligence
- Hostintel โ Host Intelligence
- IntelMQ โ A tool used by CERTs to handle incident data using message queues
- IOC Editor โ A free XML IOC file editor from Mandiant
- iocextract โ Advanced IOC Extraction Tool, Python Library, and Command Line Tool
- ioc_writer โ A Python library developed for OpenIOC objects
- MalPipe โ A malware/IOC extraction and processing engine that collects rich data.
- Massive Octo Spice โ Initiated by the CSIRT Gadgets Foundation, previously known as CIF (Collective Intelligence Framework), aggregates IOC information from various sources.
- MISP โ The Malware Information Sharing Platform initiated by The MISP Project
- Pulsedive โ A community-driven free threat intelligence platform, collecting IOCs from open-source resources.
- PyIOCe โ A Python OpenIOC Editor
- RiskIQ โ Research, Link, Annotate, and Share IPs and Domains
- threataggregator โ Aggregates security threats from multiple information sources, including some from the other resources list.
- ThreatCrowd โ A Threat Search Engine with Graphical Visualization
- ThreatTracker โ A Python script for monitoring IOCs retrieved from Google Custom Search Engine and generating alerts.
- TIQ-test โ Visualization and Statistical Analysis of Threat Intelligence Sources
Other Resources
Threat Intelligence and IOC Resources
- Autoshun (list) โ Snort Plugin and Blacklist
- Bambenek Consulting Feeds โ OSINT Subscriptions Based on Malicious DGA Algorithms
- Fidelis Barncat โ An Expandable Malware Configuration Database (Permission Required)
- CI Army (list) โ Cybersecurity Blacklist
- Critical Stack โ Free Intel Market โ A free intel deduplication and aggregation project offering over 90 subscriptions and more than 1.2 million threat intelligence entries.
- Cybercrime Tracker โ Monitoring Activities of Multiple Botnets
- FireEye IOCs โ IOC Information Shared by FireEye
- FireHOL IP Lists โ Tracking changes, country mapping, and retention policies for over 350 IPs related to attacks and malware.
- HoneyDB โ Community-Driven Honeypot Sensor Data Collection and Aggregation
- hpfeeds โ Honeypot Subscription Protocol
- CERT-PA List (IP โ Domain Name โ URL) โ Blacklist Service
- Internet Storm Center (DShield) โ Logs and searchable incident database with a Web API (unofficial Python library).
- malc0de โ Search Event Database
- Malware Domain List โ Search and Share Malicious Software URLs
- Metadefender Threat Intelligence Feeds โ Querying File Hashes in Metadefender Malware Subscription
- OpenIOC โ Threat Intelligence Sharing Framework
- Ransomware Overview โ A List of Key Concepts about Ransomware
- STIX โ Structured Threat Information eXpression โ represents and shares cyber threat information through a standardized language MITRE related:
- CAPEC โ Common Attack Pattern Enumeration and Classification
- CybOX โ Cyber Observable eXpression
- MAEC โ Malware Attribute Enumeration and Characterization
- TAXII โ Trusted Automated Exchange of Indicator Information
- ThreatMiner โ Threat Intelligence Data Mining Interface
- threatRECON โ Search indicators, up to 1,000 times per month.
- Yara rules โ Yara Rule Set
- YETI โ Yeti is a platform designed to organize observability in data, indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs), and threat intelligence.
- ZeuS Tracker โ ZeuS Blacklist
Detection and Classification
Antivirus and Other Malware Detection Tools
- AnalyzePE โ Analyzer for Windows PE Files
- Assemblyline โ A Large-Scale Distributed File Analysis Framework
- BinaryAlert โ An open-source, serverless AWS pipeline for scanning and alerting on uploaded files using YARA
- chkrootkit โ Local Linux Rootkit Detection
- ClamAV โ Open Source Antivirus Engine
- Detect-It-Easy โ A Program for Determining File Types
- Exeinfo PE โ A tool for detecting packers and compressors, equipped with unpacking information.
- ExifTool โ Reading, Writing, and Editing File Metadata
- File Scanning Framework โ A Modular Recursive File Scanning Solution
- Generic File Parser โ A standalone library parsing tool designed for extracting metadata, conducting static analysis, and detecting macros within files.
- hashdeep โ Calculate hash values using various algorithms
- HashCheck โ A Windows Shell Extension for Calculating Hash Values with Various Algorithms
- Loki โ Host-Based IOC Scanner
- Malfunction โ Classifying and Comparing Malware at the Functional Level
- Manalyze โ A Tool for Static Analysis of PE Files
- MASTIFF โ Static Analysis Framework
- MultiScanner โ Modular File Scanning/Analysis Framework
- nsrllookup โ A tool to query hashes in NISTโs National Software Reference Library database
- packerid โ A Cross-Platform Alternative to PEiD
- PE-bear โ A Reverse Engineering Tool for PE Files
- PEV โ A Cross-Platform Toolbox for Analyzing PE Files Providing Feature-Rich Tools for Accurate Examination of Suspicious Binaries
- Rootkit Hunter โ Detecting Linux Rootkits
- ssdeep โ Calculating Fuzzy Hash Values
- totalhash.py โ A Simple Python Script to Search the TotalHash.com Database
- TrID โ File Identification
- virustotal-falsepositive-detector โ A tool to analyze Virustotal Reports for potential false positives based on name similarity.
- YARA โ A Pattern Recognition Tool for Analysts
- Yara Rules Generator โ Generates Yara rules based on malicious samples and includes a string database to avoid false positives.
- Yara Finder โ A simple tool for matching files using different Yara rules in order to identify suspicious indicators.
Online Scanning and Sandbox
A web-based multi-antivirus engine scanner and sandbox for automated malware analysis
- anlyz.io โ Online Sandbox
- any.run โ Interactive Sandbox Online
- AndroTotal โ Free Online Analysis of Apps Using Multiple Mobile Antivirus Programs
- AVCaesar โ Malware.lu Online Scanner and Malware Collection
- Cryptam โ Analyzing Suspicious Office Documents
- Cuckoo Sandbox โ Open-source, autonomous sandbox, and automated analysis system
- cuckoo-modified โ A modified version of the Cuckoo Sandbox under the GPL license. The author did not merge the branch due to legal reasons.
- cuckoo-modified-api โ Python API for controlling cuckoo-modified sandbox
- DeepViz โ A Multi-format File Analyzer Using Machine Learning Classification
- detux โ A sandbox for analyzing Linux malware traffic and capturing IOC information
- DRAKVUF โ Dynamic Malware Analysis System
- firmware.re โ Unpack, Scan, and Analyze the Majority of Firmware Packages
- HaboMalHunter โ An Automated Malware Analysis Tool for Linux Platforms.
- Hybrid Analysis โ An Online Malware Analysis Tool Powered by VxSandbox
- Intezer โ Detect, Analyze, and Classify Malware by Identifying Code Reuse and Code Similarity
- IRMA โ An Asynchronous and Customizable Suspicious File Analysis Platform
- Joe Sandbox โ In-depth Malware Analysis
- Jotti โ Free Online Multi-Antivirus Engine Scanner
- Limon โ A Sandbox for Analyzing Linux Malware
- Malheur โ Automation of Malicious Behavior Sandbox Analysis
- malice.io โ A Scalable and Flexible Malware Analysis Framework
- malsub โ A Python RESTful API framework offering online malware and URL analysis services.
- Malware Configuration โ Extraction, Decoding, and Online Configuration from Common Malware
- Malwr โ Free Online Cuckoo Sandbox Analysis Instance
- MASTIFF Online โ Online Static Analysis of Malware
- Metadefender โ Scan files, hashes, or the IP address of malware
- NetworkTotal โ A service for analyzing pcap files using Suricata configured with EmergingThreats Pro for quick detection of viruses, worms, Trojans, and various types of malware.
- Noriben โ Collecting Malware Process Information in a Sandbox Environment Using Sysinternals Procmon
- PacketTotal โ An online engine for analyzing .pcap files and visualizing network traffic
- PDF Examiner โ Collect Suspicious PDF Files
- ProcDot: A Visualization Toolkit for Malware Analysis
- Recomposer โ Auxiliary Script for Securely Uploading Binary Programs to Sandbox Websites
- sandboxapi โ A Python Library Integrating Multiple Open-Source and Commercial Malware Sandboxes
- SEE โ Building Frameworks for Test Automation in a Secure Environment
- SEKOIA Dropper Analysis โ Online dropper analysis supporting Js, VBScript, Microsoft Office, PDF
- VirusTotal โ Free Online Malware Sample and URL Analysis
- Visualize_Logs โ An Open Source Visualization Library and Command-Line Tool for Logs (Cuckoo, Procmon, etc.)
- Zeltserโs List โ Free Automated Sandbox Services Created by Lenny Zeltser
Domain Analysis
Check Domain Name and IP Address
- badips.com โ A Community-Based IP Blacklisting Service
- boomerang โ A tool designed to securely capture web resources
- Cymon โ Threat intelligence tracking with IP, domain, and hash search functionalities.
- Desenmascara.me โ With just one click, obtain as much retrieval metadata as possible to evaluate a websiteโs credibility.
- Dig โ Free Online Dig and Other Networking Tools
- dnstwist โ A Domain Name Ranking Site for Detecting Phishing Websites and Corporate Espionage Activities
- IPinfo โ Gathering Information About an IP or Domain through Online Resources
- Machinae โ An OSINT tool similar to Automator for gathering information about URLs, IPs, or hashes.
- mailchecker โ Cross-Language Temporary Email Detection Library
- MaltegoVT โ Enables Maltego to utilize the VirusTotal API, allowing searches for domain names, IP addresses, file hashes, reports
- Multi RBL โ Multiple DNS Blacklists, Reverse Lookup for Over 300 RBLs
- NormShield Services โ For detecting potential phishing domains, blacklisted IP addresses, and fraudulent accounts
- PhishStats โ Search Phishing Statistics for IP, Domain, and Website Title
- SpamCop โ Spam IP Blacklist IP
- SpamHaus โ Domain and IP-Based Blacklists
- Sucuri SiteCheck โ Free Website Malware and Security Scanner
- Talos Intelligence โ Search for the owner of an IP, domain, or network
- TekDefense Automator โ OSINT Tool for Gathering Information on URLs, IPs, and Hashes
- URLQuery โ Free URL Scanner
- urlscan.io โ Free URL Scanner and Domain Information
- Whois โ Free Whois Search by DomainTools
- Zeltserโs List โ A Collection of Free Online Malware Tools Curated by Lenny Zeltser
- ZScalar Zulu โ Zulu URL Risk Analysis
Browser Malware
Analyze malicious URLs, referencing the domain analysis and documents and shellcode sections can also be considered.
- Firebug โ Firefox Web Development Extension
- Java Decompiler โ Decompile and Inspect Java Applications
- Java IDX Parser โ Parsing Java IDX Cache Files
- JSDetox โ JavaScript Malware Analysis Tool
- ย
- Krakatau โ Decompiler, Assembler, and Disassembler for Java
- Malzilla โ Analyzing Malicious Web Pages
- RABCDAsm โ A Robust ActionScript Bytecode Disassembler
- SWF Investigator โ Static and Dynamic Analysis of SWF Applications
- swftools โ A Tool for Converting PDFs to SWF
- The title โxxxswf โ Python script to analyze Flash filesโ translates to โxxxswf โ Python Script for Analyzing Flash Files.โ
Documents and Shellcode
Analyze malicious JS and shellcode in PDF and Office documents; you can also refer to the browser malware section.
- AnalyzePDF โ A tool to analyze PDFs and attempt to determine if they are malicious files.
- box-js โ A tool for analyzing JavaScript malware, featuring support for JScript/WScript and ActiveX emulation capabilities.
- diStorm โ Disassembler for Analyzing Malicious Shellcode
- JS Beautifier โ JavaScript Unpacking and Deobfuscation
- JS Deobfuscator โ For straightforward JavaScript deobfuscation using eval or document.write
- libemu โ A Library and Tool for x86 Shellcode Emulation
- malpdfobj โ Deconstruct Malicious PDF into JSON Representation
- OfficeMalScanner โ Scanning for Malicious Traces in MS Office Documents
- olevba โ A script to parse OLE and OpenXML documents and extract useful information.
- Origami PDF โ A Tool for Analyzing Malicious PDFs
- PDF Tools โ Various Tools on PDF Developed by Didier Stevens
- PDF X-Ray Lite โ A PDF Analysis Tool, the backend-free version of PDF X-RAY
- peepdf โ A Python Tool for Exploring Potentially Malicious PDFs
- QuickSand โ QuickSand is a compact C framework designed to analyze suspicious malware documents, identify vulnerabilities in various encoding streams, and locate as well as extract embedded executables.
- Spidermonkey โ Mozillaโs JavaScript engine, used for debugging suspicious JS code.
File extraction
Extracting Files from Hard Drive and Memory Images
- bulk_extractor โ Fast File Extraction Tool
- EVTXtract โ Extract Windows Event Log Files from Raw Binary Data
- Foremost โ File Extraction Tool Designed by the US Air Force
- hachoir3 โ A collection of Python libraries for handling binary programs
- Scalpel โ Another Data Extraction Tool
- SFlock โ Nested Document Extraction/Decompression (Use with Cuckoo Sandbox)
Breaking XOR or other code obfuscation methods
- Balbuzard โ A Malware Analysis Tool for Deobfuscating (XOR, ROL, etc.)
- de4dot โ .NET Demystification and Unpacking
- ex_pe_xor and iheartxor โ Two tools developed by Alexander Hanel for removing single-byte XOR encoding from files.
- FLOSS โ FireEye Labsโ de-obfuscation string tool utilizes advanced static analysis techniques to automatically extract strings from malware binaries.
- NoMoreXOR โ Using Frequency Analysis to Guess a 256-byte XOR Key
- PackerAttacker โ Universal Hidden Code Extractor for Windows Malware
- unpacker โ An Automated Windows Malware Unpacker Based on WinAppDbg
- unxor โ Using a Known-Plaintext Attack to Guess an XOR Key
- VirtualDeobfuscator โ A Virtual Reverse Engineering Tool
- XORBruteForcer โ Python Script for Brute Forcing Single-Byte XOR Keys
- XORSearch and XORStrings โ Two tools developed by Didier Stevens for searching data that has been XOR obfuscated.
- xortool โ Guess the XOR key and key length
Debugging and Reverse Engineering
Decompiler, Debuggers, and Other Static and Dynamic Analysis Tools
- angr โ A Cross-Platform Binary Analysis Framework Developed by UCSBโs Security Lab
- bamfdetect โ Identifying and Extracting Information on Miracle Malware and Other Malicious Software
- BAP โ A cross-platform open-source binary analysis framework developed by the security lab at CMU
- BARF โ Cross-platform, Open-source Binary Analysis and Reversing Framework
- binnavi โ A Graph-based Visualization Binary Analysis IDE
- Binary Ninja โ A Reverse Engineering Platform That Can Replace IDA
- Binwalk โ Firmware Analysis Tool
- Capstone โ A binary analysis disassembly framework that supports multiple architectures and many languages.
- codebro โ A web-based code browser that offers basic code analysis using clang
- Cutter โ The GUI for Radare2
- DECAF (Dynamic Executable Code Analysis Framework) โ A QEMU-based binary analysis platform, DroidScope is an extension of DECAF.
- dnSpy โ .NET Editor, Compiler, Debugger
- dotPeek โ Free .NET Decompiler and Assembly Browser
- Evanโs Debugger (EDB) โ Modular Debugger for Qt GUI Applications
- Fibratus โ A tool for exploring and tracing the Windows kernel
- FPort โ Real-time monitoring of open TCP/IP and UDP ports in the system and mapping them to applications.
- GDB โ GNU Debugger
- GEF โ An Enhanced GDB for Developers and Reverse Engineers
- hackers-grep โ Tool for searching the import table, export table, strings, and debug symbols in PE programs
- Hopper โ macOS and Linux Disassembler
- IDA Pro โ A Windows disassembler and debugger, with a free evaluation version.
- Immunity Debugger โ Malware Debugger with Python API
- ILSpy โ ILSpy is an open-source .NET assembly browser and decompiler.
- Kaitai Struct โ A tool for reverse engineering file formats, network protocols, and data structures, designed for code generation in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
- LIEF โ LIEF offers a cross-platform library for parsing, modifying, and abstracting ELF, PE, and Mach-O formats.
- ltrace โ Dynamic Analysis of Linux Executable Files
- mac-a-mal โ An Automated Framework for Malware Detection
- objdump โ A component of the GNU toolchain, used for static analysis of Linux binary programs.
- OllyDbg โ Assembly-Level Debugger for Windows Executables
- PANDA โ Dynamic Analysis Platform
- PEDA โ A Python Exploit Development Assistance tool based on GDB, featuring enhanced display and augmented commands.
- pestudio โ Static Analysis of Windows Executables
- Pharos โ A Binary Analysis Framework for Automated Static Analysis of Binary Files
- plasma โ An interactive disassembler for x86/ARM/MIPS
- PPEE (puppy) โ Professional PE File Resource Explorer
- Process Explorer โ Advanced Windows Task Manager
- Process Hacker โ A Tool for Monitoring System Resources
- Process Monitor โ An Advanced Monitoring Tool for Programs on Windows
- PSTools โ A suite of Windows command-line tools that assists administrators in managing systems in real-time.
- Pyew โ A Python Tool for Malware Analysis
- PyREBox โ A Python-scriptable reverse engineering sandbox developed by Cisco Talos team
- QKD โ Embedding WinDbg for Stealth Debugging in QEMU
- Radare2 โ A Reverse Engineering Framework with Debugger Support
- RegShot โ Utilizing Snapshots for Registry Comparison
- RetDec โ A retargetable machine code decompiler, offering both an online decompilation service and an API.
- ROPMEMU โ A Framework for Analyzing, Parsing, and Decompiling Complex Code Reuse Attacks
- SMRT โ A Plugin for Assisting Malware Analysis in Sublime 3
- strace โ Dynamic Analysis of Executable Files in Linux
- Triton โ A Dynamic Binary Analysis Framework
- Udis86 โ A Disassembly Library and Tool for x86 and x86_64
- Vivisect โ A Python Tool for Malware Analysis
- WinDbg โ A versatile debugger for the Windows operating system, capable of debugging user-mode applications, device drivers, and kernel dumps.
- X64dbg โ An open-source x64/x32 debugger for Windows
Network
Analyze Network Interactions
- Bro โ A protocol analysis tool that supports an impressive range of file and network protocols.
- BroYara โ Yara Rule Set Based on Bro
- CapTipper โ Malicious HTTP Traffic Manager
- chopshop โ Protocol Analysis and Decoding Framework
- CloudShark โ A Web-Based Packet Analysis Tool and Malware Traffic Detection.
- Fiddler โ A Web Proxy Specially Designed for Web Debugging and Development
- Hale โ Botnet C&C Monitor
- Haka โ A security-oriented open-source language used to describe protocols and enforce security policies during real-time traffic capture.
- HTTPReplay โ A library for analyzing PCAP files, including TLS streams using the TLS master key (for Cuckoo)
- INetSim โ Network Service Simulation. Very useful for building a malware analysis lab.
- Laika BOSS โ Laika BOSS is a file-centric malware analysis and intrusion detection system.
- Malcom โ Malware Communication Analyzer
- Maltrail โ A malicious traffic detection system that uses publicly available blacklists to identify malicious and suspicious communication traffic, featuring a reporting and analysis interface.
- mitmproxy โ Intercepting Network Traffic Communication
- Moloch โ IPv4 Traffic Capture with Indexing and Database System
- NetworkMiner โ A Free Version Network Forensics Analysis Tool
- ngrep โ Capturing Network Traffic Like GREP
- PcapViz โ Network Topology and Traffic Visualization
- Python ICAP Yara โ An ICAP server with a YARA scanner for URLs or content
- Squidmagic โ Utilized for analyzing web-based network traffic, employing Squid proxy server and Spamhaus to detect C&C servers and malicious websites.
cpdump โ Collecting Network Traffic
- tcpick โ Reconstruct TCP Streams from Network Traffic
- **tcpxtract โ Extracting Files from Network Traffic**
In this context, โtcpxtractโ is a tool used to extract files from network traffic. It analyzes the data packets transmitted over a network and reconstructs files based on the captured data. This can be particularly useful for network forensics and security analysis, allowing experts to retrieve files that were transmitted over a network, potentially identifying unauthorized data transfers or malicious activity.
- Wireshark โ Network Traffic Analysis Tool
Memory Forensics
Tools for Analyzing Malware in Memory Images or Running Systems
- BlackLight โ A Forensic Client for Windows/MacOS Supporting hiberfil, pagefile, and Raw Memory Analysis
- DAMM โ Differential Analysis of Malware in Memory Using Volatility
- evolve โ A Web Interface for the Volatility Memory Forensics Framework
- FindAES โ Searching for AES Encryption Keys in Memory
- inVtero.net โ A high-speed memory analysis framework developed in .NET, supporting all Windows x64 platforms, including code integrity and write support.
- Muninn โ An automated analysis script using Volatility, capable of generating a readable report.
- Rekall โ Memory analysis framework, a branch version of Volatility released in 2013.
- TotalRecall โ A Script for Automating Multi-Sample Malware Analysis Based on Volatility
- VolDiff โ Run Volatility on memory images before and after malware execution to generate a comparison report.
- Volatility โ An Advanced Memory Forensics Framework
- VolUtility โ Web Interface for the Volatility Memory Analysis Framework
- WDBGARK โ WindDBG Anti-Rootkit Extension
- WinDbg โ A real-time memory inspection and kernel debugging tool for Windows systems
Windows Tool
- AChoir โ A Collection of Real-time Event Response Scripts for Windows
- python-evt โ A Python library for parsing Windows event logs
- python-registry โ A Python library for parsing registry files
RegRipper (GitHub) โ A Tool Based on a Collection of Plugins
Storage and Workflow
- Aleph โ Open Source Malware Analysis Pipeline System
- CRITs โ Collaborative Research into Threats and Malware
- FAME โ A malware analysis framework that can be extended with custom modules. These modules can be linked and interact with each other to perform end-to-end analysis.
- Malwarehouse โ Storage, Annotation, and Search of Malware
- Polichombr โ A malware analysis platform designed to assist analysts in reverse engineering malware.
- stoQ โ A distributed content analysis framework with extensive plugin support.
- Viper โ A Binary Management and Analysis Framework for Analysts
Miscellaneous
- al-khaser โ A Proof-of-Concept (PoC) malware designed to highlight anti-malware systems.
- CryptoKnight โ Framework for Automated Reverse Engineering and Classification of Cryptographic Algorithms
- DC3-MWCP โ Malware Configuration Parsing Framework of the Defense Cyber Crime Center
- FLARE VM โ A Windows-Based Customized Security Distribution for Malware Analysis
- MalSploitBase โ A Database of Vulnerabilities Exploited by Malware
- Malware Museum โ Collection of Popular Malware from the 1980s and 1990s
Malware Organizer โ A Tool for Structuring Large Malicious/Benign Files into an Organized Framework
- Pafish โ Paranoid Fish, a demonstration tool aligned with malware family behaviors, employs various techniques to detect sandbox and analysis environments.
- **REMnux โ A Linux Distribution and Docker Image for Malware Reverse Engineers and Analysts**
This translation maintains the original formatting and style, focusing on the specialized terminology relevant to web security and malware analysis.
- Santoku Linux โ A Linux Distribution for Mobile Forensics
**Book**
Fundamental Malware Analysis Reading List
- Malware Analystโs Cookbook and DVD โ Tools and Techniques to Fight Malicious Code
- Practical Malware Analysis โ A Handbook for Dissecting Malicious Software
- Practical Reverse Engineering โ Intermediate Reverse Engineering.
- Real Digital Forensics โ Computer Security and Incident Response
- The Art of Memory Forensics โ Detecting Malware and Threats in Memory on Windows, Linux, and Mac Systems
- The IDA Pro Book โ An Unofficial Guide to the Worldโs Most Popular Disassembler
- The Rootkit Arsenal โ Stealth Intruders in the Dark Corners of the System: The Rootkit Arsenal
Some relevant Twitter accounts
- Adamb @Hexacorn
- Andrew Case @attrc
- Binni Shah @binitamshah
- Claudio @botherder
- Dustin Webber @mephux
- Glenn @hiddenillusion
- jekil @jekil
- Jurriaan Bremer @skier_t
- Lenny Zeltser @lennyzeltser
- Liam Randall @hectaman
- Mark Schloesser @repmovsb
- Michael Ligh (MHL) @iMHLv2
- Monnappa @monnappa22
- Open Malware @OpenMalware
- Richard Bejtlich @taosecurity
- Volatility @volatility
- APT Notes โ A Collection of Literature on APTs
- File Formats Posters โ Visualization of Common File Formats (Including PE and ELF)
- Honeynet Project โ Honeypot Tools, Papers, and Other Resources
- Kernel Mode โ A vibrant community dedicated to malware analysis and kernel development
- Malicious Software โ Lenny Zeltserโs Malware Blog and Resources
- Malware Analysis Search โ Corey Harrellโs Custom Google Search for Malware Analysis
- Malware Analysis Tutorials โ An essential resource for learning malware analysis, provided by Dr. Xiang Fu.
- Malware Samples and Traffic โ This blog focuses on the network traffic associated with malware infections.
- Practical Malware Analysis Starter Kit โ This package contains most of the software referenced in the book Practical Malware Analysis.
- RPISEC Malware Analysis โ Course materials used in the Malware Analysis course during the Fall 2015 semester at Rensselaer Polytechnic Institute
- WindowsIR: Malware โ Harlan Carveyโs Malware Page
- Windows Registry File Format Specification โ Windows Register file format specification
- /r/csirt_tools โ A subreddit for CSIRT tools and resources, discussing the prodigies of malware analysis
- /r/Malware โ The Subreddit for Malware
- /r/ReverseEngineering โ The reverse engineering subreddit, not limited to malware
- Ember โ Endgame Malware Benchmark for Research is a library designed for building machine learning models, which perform scoring based on the results of static analysis.