Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Correia-jpv/fucking-awesome-malware-analysis
Defund the Police. With repository stars⭐ and forks🍴
https://github.com/Correia-jpv/fucking-awesome-malware-analysis
List: fucking-awesome-malware-analysis
analysis-framework automated-analysis awesome awesome-list chinese chinese-translation domain-analysis drop-ice dynamic-analysis list malware-analysis malware-collection malware-research malware-samples network-traffic static-analysis thread-sharing threat-intelligence threatintel
Last synced: 3 months ago
JSON representation
Defund the Police. With repository stars⭐ and forks🍴
- Host: GitHub
- URL: https://github.com/Correia-jpv/fucking-awesome-malware-analysis
- Owner: Correia-jpv
- License: other
- Created: 2022-08-02T20:17:11.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-08-12T06:59:07.000Z (3 months ago)
- Last Synced: 2024-08-12T08:13:22.977Z (3 months ago)
- Topics: analysis-framework, automated-analysis, awesome, awesome-list, chinese, chinese-translation, domain-analysis, drop-ice, dynamic-analysis, list, malware-analysis, malware-collection, malware-research, malware-samples, network-traffic, static-analysis, thread-sharing, threat-intelligence, threatintel
- Homepage:
- Size: 536 KB
- Stars: 13
- Watchers: 2
- Forks: 2
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- ultimate-awesome - fucking-awesome-malware-analysis - Defund the Police. With repository stars⭐ and forks🍴. (Other Lists / PowerShell Lists)
README
# Awesome Malware Analysis [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
A curated list of awesome malware analysis tools and resources. Inspired by
215335⭐
24726🍴
[awesome-python](https://github.com/vinta/awesome-python)) and30711⭐
5053🍴
[awesome-php](https://github.com/ziadoz/awesome-php)).[![Drop ICE](drop.png)](https://twitter.com/githubbers/status/1182017616740663296)
- [Malware Collection](#malware-collection)
- [Anonymizers](#anonymizers)
- [Honeypots](#honeypots)
- [Malware Corpora](#malware-corpora)
- [Open Source Threat Intelligence](#open-source-threat-intelligence)
- [Tools](#tools)
- [Other Resources](#other-resources)
- [Detection and Classification](#detection-and-classification)
- [Online Scanners and Sandboxes](#online-scanners-and-sandboxes)
- [Domain Analysis](#domain-analysis)
- [Browser Malware](#browser-malware)
- [Documents and Shellcode](#documents-and-shellcode)
- [File Carving](#file-carving)
- [Deobfuscation](#deobfuscation)
- [Debugging and Reverse Engineering](#debugging-and-reverse-engineering)
- [Network](#network)
- [Memory Forensics](#memory-forensics)
- [Windows Artifacts](#windows-artifacts)
- [Storage and Workflow](#storage-and-workflow)
- [Miscellaneous](#miscellaneous)
- [Resources](#resources)
- [Books](#books)
- [Other](#other)
- [Related Awesome Lists](#related-awesome-lists)
- [Contributing](#contributing)
- [Thanks](#thanks)View Chinese translation: [恶意软件分析大合集.md](恶意软件分析大合集.md).
---
## Malware Collection
### Anonymizers
*Web traffic anonymizers for analysts.*
* [Anonymouse.org](http://anonymouse.org/) - A free, web based anonymizer.
* 🌎 [OpenVPN](openvpn.net/) - VPN software and hosting solutions.
* [Privoxy](http://www.privoxy.org/) - An open source proxy server with some
privacy features.
* 🌎 [Tor](www.torproject.org/) - The Onion Router, for browsing the web
without leaving traces of the client IP.### Honeypots
*Trap and collect your own samples.*
*
1216⭐
413🍴
[Conpot](https://github.com/mushorg/conpot)) - ICS/SCADA honeypot.
*5066⭐
870🍴
[Cowrie](https://github.com/micheloosterhof/cowrie)) - SSH honeypot, based
on Kippo.
*58⭐
12🍴
[DemoHunter](https://github.com/RevengeComing/DemonHunter)) - Low interaction Distributed Honeypots.
*691⭐
185🍴
[Dionaea](https://github.com/DinoTools/dionaea)) - Honeypot designed to trap malware.
*548⭐
172🍴
[Glastopf](https://github.com/mushorg/glastopf)) - Web application honeypot.
* [Honeyd](http://www.honeyd.org/) - Create a virtual honeynet.
* 🌎 [HoneyDrive](bruteforce.gr/honeydrive/) - Honeypot bundle Linux distro.
*1210⭐
176🍴
[Honeytrap](https://github.com/honeytrap/honeytrap)) - Opensource system for running, monitoring and managing honeypots.
*2418⭐
631🍴
[MHN](https://github.com/pwnlandia/mhn)) - MHN is a centralized server for management and data collection of honeypots. MHN allows you to deploy sensors quickly and to collect data immediately, viewable from a neat web interface.
*44⭐
40🍴
[Mnemosyne](https://github.com/johnnykv/mnemosyne)) - A normalizer for
honeypot data; supports Dionaea.
*974⭐
204🍴
[Thug](https://github.com/buffer/thug)) - Low interaction honeyclient, for
investigating malicious websites.### Malware Corpora
*Malware samples collected for analysis.*
* [Clean MX](http://support.clean-mx.com/clean-mx/viruses.php) - Realtime
database of malware and malicious domains.
* [Contagio](http://contagiodump.blogspot.com/) - A collection of recent
malware samples and analyses.
* 🌎 [Exploit Database](www.exploit-db.com/) - Exploit and shellcode
samples.
* 🌎 [Infosec - CERT-PA](infosec.cert-pa.it/analyze/submission.html) - Malware samples collection and analysis.
* 🌎 [InQuest Labs](labs.inquest.net) - Evergrowing searchable corpus of malicious Microsoft documents.
*658⭐
239🍴
[Javascript Mallware Collection](https://github.com/HynekPetrak/javascript-malware-collection)) - Collection of almost 40.000 javascript malware samples
* 🌎 [Malpedia](malpedia.caad.fkie.fraunhofer.de/) - A resource providing
rapid identification and actionable context for malware investigations.
* 🌎 [Malshare](malshare.com) - Large repository of malware actively
scrapped from malicious sites.
*91⭐
25🍴
[Ragpicker](https://github.com/robbyFux/Ragpicker)) - Plugin based malware
crawler with pre-analysis and reporting functionalities
*11032⭐
2492🍴
[theZoo](https://github.com/ytisf/theZoo)) - Live malware samples for
analysts.
* [Tracker h3x](http://tracker.h3x.eu/) - Agregator for malware corpus tracker
and malicious download sites.
*?⭐
?🍴
[vduddu malware repo](https://github.com/vduddu/Malware)) - Collection of
various malware files and source code.
* 🌎 [VirusBay](beta.virusbay.io/) - Community-Based malware repository and social network.
* [ViruSign](http://www.virussign.com/) - Malware database that detected by
many anti malware programs except ClamAV.
* 🌎 [VirusShare](virusshare.com/) - Malware repository, registration
required.
* [VX Vault](http://vxvault.net) - Active collection of malware samples.
* 🌎 [Zeltser's Sources](zeltser.com/malware-sample-sources/) - A list
of malware sample sources put together by Lenny Zeltser.
*1390⭐
695🍴
[Zeus Source Code](https://github.com/Visgean/Zeus)) - Source for the Zeus
trojan leaked in 2011.
* [VX Underground](http://vx-underground.org/) - Massive and growing collection of free malware samples.## Open Source Threat Intelligence
### Tools
*Harvest and analyze IOCs.*
*
114⭐
18🍴
[AbuseHelper](https://github.com/abusesa/abusehelper)) - An open-source
framework for receiving and redistributing abuse feeds and threat intel.
* 🌎 [AlienVault Open Threat Exchange](otx.alienvault.com/) - Share and
collaborate in developing Threat Intelligence.
*650⭐
179🍴
[Combine](https://github.com/mlsecproject/combine)) - Tool to gather Threat
Intelligence indicators from publicly available sources.
*116⭐
25🍴
[Fileintel](https://github.com/keithjjones/fileintel)) - Pull intelligence per file hash.
*260⭐
52🍴
[Hostintel](https://github.com/keithjjones/hostintel)) - Pull intelligence per host.
* 🌎 [IntelMQ](www.enisa.europa.eu/topics/csirt-cert-services/community-projects/incident-handling-automation) -
A tool for CERTs for processing incident data using a message queue.
* 🌎 [IOC Editor](www.fireeye.com/services/freeware/ioc-editor.html) -
A free editor for XML IOC files.
*498⭐
90🍴
[iocextract](https://github.com/InQuest/python-iocextract)) - Advanced Indicator
of Compromise (IOC) extractor, Python library and command-line tool.
*199⭐
60🍴
[ioc_writer](https://github.com/mandiant/ioc_writer)) - Python library for
working with OpenIOC objects, from Mandiant.
*102⭐
24🍴
[MalPipe](https://github.com/silascutler/MalPipe)) - Malware/IOC ingestion and
processing engine, that enriches collected data.
*227⭐
62🍴
[Massive Octo Spice](https://github.com/csirtgadgets/massive-octo-spice)) -
Previously known as CIF (Collective Intelligence Framework). Aggregates IOCs
from various lists. Curated by the
[CSIRT Gadgets Foundation](http://csirtgadgets.org/collective-intelligence-framework).
*5185⭐
1371🍴
[MISP](https://github.com/MISP/MISP)) - Malware Information Sharing
Platform curated by [The MISP Project](http://www.misp-project.org/).
* 🌎 [Pulsedive](pulsedive.com) - Free, community-driven threat intelligence platform collecting IOCs from open-source feeds.
*16⭐
7🍴
[PyIOCe](https://github.com/pidydx/PyIOCe)) - A Python OpenIOC editor.
* 🌎 [RiskIQ](community.riskiq.com/) - Research, connect, tag and
share IPs and domains. (Was PassiveTotal.)
*78⭐
27🍴
[threataggregator](https://github.com/jpsenior/threataggregator)) -
Aggregates security threats from a number of sources, including some of
those listed below in [other resources](#other-resources).
* 🌎 [ThreatConnect](threatconnect.com/free/) - TC Open allows you to see and
share open source threat data, with support and validation from our free community.
* 🌎 [ThreatCrowd](www.threatcrowd.org/) - A search engine for threats,
with graphical visualization.
*?⭐
?🍴
[ThreatIngestor](https://github.com/InQuest/ThreatIngestor/)) - Build
automated threat intel pipelines sourcing from Twitter, RSS, GitHub, and
more.
*64⭐
13🍴
[ThreatTracker](https://github.com/michael-yip/ThreatTracker)) - A Python
script to monitor and generate alerts based on IOCs indexed by a set of
Google Custom Search Engines.
*166⭐
43🍴
[TIQ-test](https://github.com/mlsecproject/tiq-test)) - Data visualization
and statistical analysis of Threat Intelligence feeds.### Other Resources
*Threat intelligence and IOC resources.*
* 🌎 [Autoshun](www.autoshun.org/) 🌎 [list](www.autoshun.org/files/shunlist.csv)) -
Snort plugin and blocklist.
* [Bambenek Consulting Feeds](http://osint.bambenekconsulting.com/feeds/) -
OSINT feeds based on malicious DGA algorithms.
* 🌎 [Fidelis Barncat](www.fidelissecurity.com/resources/fidelis-barncat) -
Extensive malware config database (must request access).
* [CI Army](http://cinsscore.com/) ([list](http://cinsscore.com/list/ci-badguys.txt)) -
Network security blocklists.
* 🌎 [Critical Stack- Free Intel Market](intel.criticalstack.com) - Free
intel aggregator with deduplication featuring 90+ feeds and over 1.2M indicators.
* [Cybercrime tracker](http://cybercrime-tracker.net/) - Multiple botnet active tracker.
*461⭐
116🍴
[FireEye IOCs](https://github.com/fireeye/iocs)) - Indicators of Compromise
shared publicly by FireEye.
* 🌎 [FireHOL IP Lists](iplists.firehol.org/) - Analytics for 350+ IP lists
with a focus on attacks, malware and abuse. Evolution, Changes History,
Country Maps, Age of IPs listed, Retention Policy, Overlaps.
* 🌎 [HoneyDB](riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.
*209⭐
110🍴
[hpfeeds](https://github.com/rep/hpfeeds)) - Honeypot feed protocol.
* 🌎 [Infosec - CERT-PA lists](infosec.cert-pa.it/analyze/statistics.html) 🌎 [IPs](infosec.cert-pa.it/analyze/listip.txt) - 🌎 [Domains](infosec.cert-pa.it/analyze/listdomains.txt) - 🌎 [URLs](infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.
* 🌎 [InQuest REPdb](labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources.
* 🌎 [InQuest IOCdb](labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.
* 🌎 [Internet Storm Center (DShield)](isc.sans.edu/) - Diary and
searchable incident database, with a web 🌎 [API](dshield.org/api/).
(26⭐
13🍴
[unofficial Python library](https://github.com/rshipp/python-dshield))).
* [malc0de](http://malc0de.com/database/) - Searchable incident database.
* [Malware Domain List](http://www.malwaredomainlist.com/) - Search and share
malicious URLs.
* 🌎 [MetaDefender Threat Intelligence Feed](www.opswat.com/developers/threat-intelligence-feed) -
List of the most looked up file hashes from MetaDefender Cloud.
* 🌎 [OpenIOC](www.fireeye.com/services/freeware.html) - Framework for sharing threat intelligence.
* 🌎 [Proofpoint Threat Intelligence](www.proofpoint.com/us/products/et-intelligence) -
Rulesets and more. (Formerly Emerging Threats.)
* 🌎 [Ransomware overview](docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml) -
A list of ransomware overview with details, detection and prevention.
* [STIX - Structured Threat Information eXpression](http://stixproject.github.io) -
Standardized language to represent and share cyber threat information.
Related efforts from 🌎 [MITRE](www.mitre.org/):
- [CAPEC - Common Attack Pattern Enumeration and Classification](http://capec.mitre.org/)
- [CybOX - Cyber Observables eXpression](http://cyboxproject.github.io)
- [MAEC - Malware Attribute Enumeration and Characterization](http://maec.mitre.org/)
- [TAXII - Trusted Automated eXchange of Indicator Information](http://taxiiproject.github.io)
* 🌎 [SystemLookup](www.systemlookup.com/) - SystemLookup hosts a collection of lists that provide information on
the components of legitimate and potentially unwanted programs.
* 🌎 [ThreatMiner](www.threatminer.org/) - Data mining portal for threat
intelligence, with search.
* 🌎 [threatRECON](threatrecon.co/) - Search for indicators, up to 1000
free per month.
* 🌎 [ThreatShare](threatshare.io/) - C2 panel tracker
*4081⭐
995🍴
[Yara rules](https://github.com/Yara-Rules/rules)) - Yara rules repository.
*1686⭐
283🍴
[YETI](https://github.com/yeti-platform/yeti)) - Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository.
* 🌎 [ZeuS Tracker](zeustracker.abuse.ch/blocklist.php) - ZeuS
blocklists.## Detection and Classification
*Antivirus and other malware identification tools*
*
201⭐
37🍴
[AnalyzePE](https://github.com/hiddenillusion/AnalyzePE)) - Wrapper for a
variety of tools for reporting on Windows PE files.
* 🌎 [Assemblyline](cybercentrecanada.github.io/assemblyline4_docs/) - A scalable file triage and malware analysis system integrating the cyber security community's best tools..
*1400⭐
187🍴
[BinaryAlert](https://github.com/airbnb/binaryalert)) - An open source, serverless
AWS pipeline that scans and alerts on uploaded files based on a set of
YARA rules.
*4037⭐
510🍴
[capa](https://github.com/fireeye/capa)) - Detects capabilities in executable files.
* [chkrootkit](http://www.chkrootkit.org/) - Local Linux rootkit detection.
* [ClamAV](http://www.clamav.net/) - Open source antivirus engine.
*7073⭐
702🍴
[Detect It Easy(DiE)](https://github.com/horsicq/Detect-It-Easy)) - A program for
determining types of files.
* [Exeinfo PE](http://exeinfo.pe.hu/) - Packer, compressor detector, unpack
info, internal exe tools.
* 🌎 [ExifTool](sno.phy.queensu.ca/~phil/exiftool/) - Read, write and
edit file metadata.
*283⭐
49🍴
[File Scanning Framework](https://github.com/EmersonElectricCo/fsf)) -
Modular, recursive file scanning solution.
*1512⭐
187🍴
[fn2yara](https://github.com/cmu-sei/pharos)) - FN2Yara is a tool to generate
Yara signatures for matching functions (code) in an executable program.
*0⭐
0🍴
[Generic File Parser](https://github.com/uppusaikiran/generic-parser)) - A Single Library Parser to extract meta information,static analysis and detect macros within the files.
*696⭐
132🍴
[hashdeep](https://github.com/jessek/hashdeep)) - Compute digest hashes with
a variety of algorithms.
*1723⭐
196🍴
[HashCheck](https://github.com/gurnec/HashCheck)) - Windows shell extension
to compute hashes with a variety of algorithms.
*3314⭐
580🍴
[Loki](https://github.com/Neo23x0/Loki)) - Host based scanner for IOCs.
*191⭐
35🍴
[Malfunction](https://github.com/Dynetics/Malfunction)) - Catalog and
compare malware at a function level.
*1005⭐
162🍴
[Manalyze](https://github.com/JusticeRage/Manalyze)) - Static analyzer for PE
executables.
*174⭐
40🍴
[MASTIFF](https://github.com/KoreLogicSecurity/mastiff)) - Static analysis
framework.
*616⭐
126🍴
[MultiScanner](https://github.com/mitre/multiscanner)) - Modular file
scanning/analysis framework
*510⭐
82🍴
[Nauz File Detector(NFD)](https://github.com/horsicq/Nauz-File-Detector)) - Linker/Compiler/Tool detector for Windows, Linux and MacOS.
*110⭐
10🍴
[nsrllookup](https://github.com/rjhansen/nsrllookup)) - A tool for looking
up hashes in NIST's National Software Reference Library database.
*41⭐
8🍴
[packerid](https://github.com/sooshie/packerid)) - A cross-platform
Python alternative to PEiD.
* 🌎 [PE-bear](hshrzd.wordpress.com/pe-bear/) - Reversing tool for PE
files.
*601⭐
142🍴
[PEframe](https://github.com/guelfoweb/peframe)) - PEframe is an open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.
* [PEV](http://pev.sourceforge.net/) - A multiplatform toolkit to work with PE
files, providing feature-rich tools for proper analysis of suspicious binaries.
*495⭐
95🍴
[PortEx](https://github.com/katjahahn/PortEx)) - Java library to analyse PE files with a special focus on malware analysis and PE malformation robustness.
*1265⭐
165🍴
[Quark-Engine](https://github.com/quark-engine/quark-engine)) - An Obfuscation-Neglect Android Malware Scoring System
* [Rootkit Hunter](http://rkhunter.sourceforge.net/) - Detect Linux rootkits.
* 🌎 [ssdeep](ssdeep-project.github.io/ssdeep/) - Compute fuzzy hashes.
* 🌎 [totalhash.py](gist.github.com/gleblanc1783/3c8e6b379fa9d646d401b96ab5c7877f) -
Python script for easy searching of the 🌎 [TotalHash.cymru.com](totalhash.cymru.com/)
database.
* [TrID](http://mark0.net/soft-trid-e.html) - File identifier.
* 🌎 [YARA](plusvic.github.io/yara/) - Pattern matching tool for
analysts.
*1509⭐
281🍴
[Yara rules generator](https://github.com/Neo23x0/yarGen)) - Generate
yara rules based on a set of malware samples. Also contains a good
strings DB to avoid false positives.
*0⭐
0🍴
[Yara Finder](https://github.com/uppusaikiran/yara-finder)) - A simple tool to yara match the file against various yara rules to find the indicators of suspicion.## Online Scanners and Sandboxes
*Web-based multi-AV scanners, and malware sandboxes for automated analysis.*
* 🌎 [anlyz.io](sandbox.anlyz.io/) - Online sandbox.
* 🌎 [any.run](app.any.run/) - Online interactive sandbox.
* 🌎 [AndroTotal](andrototal.org/) - Free online analysis of APKs
against multiple mobile antivirus apps.
*230⭐
38🍴
[BoomBox](https://github.com/nbeede/BoomBox)) - Automatic deployment of Cuckoo
Sandbox malware lab using Packer and Vagrant.
* [Cryptam](http://www.cryptam.com/) - Analyze suspicious office documents.
* 🌎 [Cuckoo Sandbox](cuckoosandbox.org/) - Open source, self hosted
sandbox and automated analysis system.
*268⭐
100🍴
[cuckoo-modified](https://github.com/brad-accuvant/cuckoo-modified)) - Modified
version of Cuckoo Sandbox released under the GPL. Not merged upstream due to
legal concerns by the author.
*19⭐
7🍴
[cuckoo-modified-api](https://github.com/keithjjones/cuckoo-modified-api)) - A
Python API used to control a cuckoo-modified sandbox.
* 🌎 [DeepViz](www.deepviz.com/) - Multi-format file analyzer with
machine-learning classification.
*?⭐
?🍴
[detux](https://github.com/detuxsandbox/detux/)) - A sandbox developed to do
traffic analysis of Linux malwares and capturing IOCs.
*1032⭐
247🍴
[DRAKVUF](https://github.com/tklengyel/drakvuf)) - Dynamic malware analysis
system.
* 🌎 [filescan.io](www.filescan.io/) - Static malware analysis, VBA/Powershell/VBS/JS Emulation
* [firmware.re](http://firmware.re/) - Unpacks, scans and analyzes almost any
firmware package.
*726⭐
221🍴
[HaboMalHunter](https://github.com/Tencent/HaboMalHunter)) - An Automated Malware
Analysis Tool for Linux ELF Files.
* 🌎 [Hybrid Analysis](www.hybrid-analysis.com/) - Online malware
analysis tool, powered by VxSandbox.
* 🌎 [Intezer](analyze.intezer.com) - Detect, analyze, and categorize malware by
identifying code reuse and code similarities.
* [IRMA](http://irma.quarkslab.com/) - An asynchronous and customizable
analysis platform for suspicious files.
* 🌎 [Joe Sandbox](www.joesecurity.org) - Deep malware analysis with Joe Sandbox.
* 🌎 [Jotti](virusscan.jotti.org/en) - Free online multi-AV scanner.
*387⭐
115🍴
[Limon](https://github.com/monnappa22/Limon)) - Sandbox for Analyzing Linux Malware.
*365⭐
101🍴
[Malheur](https://github.com/rieck/malheur)) - Automatic sandboxed analysis
of malware behavior.
*1636⭐
267🍴
[malice.io](https://github.com/maliceio/malice)) - Massively scalable malware analysis framework.
*366⭐
83🍴
[malsub](https://github.com/diogo-fernan/malsub)) - A Python RESTful API framework for
online malware and URL analysis services.
* 🌎 [Malware config](malwareconfig.com/) - Extract, decode and display online
the configuration settings from common malwares.
* 🌎 [MalwareAnalyser.io](malwareanalyser.io/) - Online malware anomaly-based static analyser with heuristic detection engine powered by data mining and machine learning.
* 🌎 [Malwr](malwr.com/) - Free analysis with an online Cuckoo Sandbox
instance.
* 🌎 [MetaDefender Cloud](metadefender.opswat.com/ ) - Scan a file, hash, IP, URL or
domain address for malware for free.
* 🌎 [NetworkTotal](www.networktotal.com/index.html) - A service that analyzes
pcap files and facilitates the quick detection of viruses, worms, trojans, and all
kinds of malware using Suricata configured with EmergingThreats Pro.
*1096⭐
223🍴
[Noriben](https://github.com/Rurik/Noriben)) - Uses Sysinternals Procmon to
collect information about malware in a sandboxed environment.
* 🌎 [PacketTotal](packettotal.com/) - PacketTotal is an online engine for analyzing .pcap files, and visualizing the network traffic within.
* [PDF Examiner](http://www.pdfexaminer.com/) - Analyse suspicious PDF files.
* [ProcDot](http://www.procdot.com) - A graphical malware analysis tool kit.
*130⭐
40🍴
[Recomposer](https://github.com/secretsquirrel/recomposer)) - A helper
script for safely uploading binaries to sandbox sites.
*133⭐
40🍴
[sandboxapi](https://github.com/InQuest/python-sandboxapi)) - Python library for
building integrations with several open source and commercial malware sandboxes.
*811⭐
104🍴
[SEE](https://github.com/F-Secure/see)) - Sandboxed Execution Environment (SEE)
is a framework for building test automation in secured Environments.
* 🌎 [SEKOIA Dropper Analysis](malware.sekoia.fr/) - Online dropper analysis (Js, VBScript, Microsoft Office, PDF).
* 🌎 [VirusTotal](www.virustotal.com/) - Free online analysis of malware
samples and URLs
*136⭐
30🍴
[Visualize_Logs](https://github.com/keithjjones/visualize_logs)) - Open source
visualization library and command line tools for logs. (Cuckoo, Procmon, more
to come...)
* 🌎 [Zeltser's List](zeltser.com/automated-malware-analysis/) - Free
automated sandboxes and services, compiled by Lenny Zeltser.## Domain Analysis
*Inspect domains and IP addresses.*
* 🌎 [AbuseIPDB](www.abuseipdb.com/) - AbuseIPDB is a project dedicated
to helping combat the spread of hackers, spammers, and abusive activity on the internet.
* 🌎 [badips.com](www.badips.com/) - Community based IP blacklist service.
*34⭐
6🍴
[boomerang](https://github.com/EmersonElectricCo/boomerang)) - A tool designed
for consistent and safe capture of off network web resources.
* 🌎 [Cymon](cymon.io/) - Threat intelligence tracker, with IP/domain/hash
search.
* [Desenmascara.me](http://desenmascara.me) - One click tool to retrieve as
much metadata as possible for a website and to assess its good standing.
* 🌎 [Dig](networking.ringofsaturn.com/) - Free online dig and other
network tools.
*4782⭐
761🍴
[dnstwist](https://github.com/elceef/dnstwist)) - Domain name permutation
engine for detecting typo squatting, phishing and corporate espionage.
*96⭐
28🍴
[IPinfo](https://github.com/hiddenillusion/IPinfo)) - Gather information
about an IP or domain by searching online resources.
*500⭐
100🍴
[Machinae](https://github.com/hurricanelabs/machinae)) - OSINT tool for
gathering information about URLs, IPs, or hashes. Similar to Automator.
*1593⭐
243🍴
[mailchecker](https://github.com/FGRibreau/mailchecker)) - Cross-language
temporary email detection library.
*78⭐
22🍴
[MaltegoVT](https://github.com/michael-yip/MaltegoVT)) - Maltego transform
for the VirusTotal API. Allows domain/IP research, and searching for file
hashes and scan reports.
* [Multi rbl](http://multirbl.valli.org/) - Multiple DNS blacklist and forward
confirmed reverse DNS lookup over more than 300 RBLs.
* 🌎 [NormShield Services](services.normshield.com/) - Free API Services
for detecting possible phishing domains, blacklisted ip addresses and breached
accounts.
* 🌎 [PhishStats](phishstats.info/) - Phishing Statistics with search for
IP, domain and website title
* 🌎 [Spyse](spyse.com/) - subdomains, whois, realted domains, DNS, hosts AS, SSL/TLS info,
* 🌎 [SecurityTrails](securitytrails.com/) - Historical and current WHOIS,
historical and current DNS records, similar domains, certificate information
and other domain and IP related API and tools.
* 🌎 [SpamCop](www.spamcop.net/bl.shtml) - IP based spam block list.
* 🌎 [SpamHaus](www.spamhaus.org/lookup/) - Block list based on
domains and IPs.
* 🌎 [Sucuri SiteCheck](sitecheck.sucuri.net/) - Free Website Malware
and Security Scanner.
* 🌎 [Talos Intelligence](talosintelligence.com/) - Search for IP, domain
or network owner. (Previously SenderBase.)
* [TekDefense Automater](http://www.tekdefense.com/automater/) - OSINT tool
for gathering information about URLs, IPs, or hashes.
* 🌎 [URLhaus](urlhaus.abuse.ch/) - A project from abuse.ch with the goal
of sharing malicious URLs that are being used for malware distribution.
* [URLQuery](http://urlquery.net/) - Free URL Scanner.
* 🌎 [urlscan.io](urlscan.io/) - Free URL Scanner & domain information.
* 🌎 [Whois](whois.domaintools.com/) - DomainTools free online whois
search.
* 🌎 [Zeltser's List](zeltser.com/lookup-malicious-websites/) - Free
online tools for researching malicious websites, compiled by Lenny Zeltser.
* 🌎 [ZScalar Zulu](zulu.zscaler.com/#) - Zulu URL Risk Analyzer.## Browser Malware
*Analyze malicious URLs. See also the [domain analysis](#domain-analysis) and
[documents and shellcode](#documents-and-shellcode) sections.**
14529⭐
1138🍴
[Bytecode Viewer](https://github.com/Konloch/bytecode-viewer)) - Combines
multiple Java bytecode viewers and decompilers into one tool, including
APK/DEX support.
* 🌎 [Firebug](getfirebug.com/) - Firefox extension for web development.
* [Java Decompiler](http://jd.benow.ca/) - Decompile and inspect Java apps.
*?⭐
?🍴
[Java IDX Parser](https://github.com/Rurik/Java_IDX_Parser/)) - Parses Java
IDX cache files.
* [JSDetox](http://www.relentless-coding.com/projects/jsdetox/) - JavaScript
malware analysis tool.
*159⭐
65🍴
[jsunpack-n](https://github.com/urule99/jsunpack-n)) - A javascript
unpacker that emulates browser functionality.
*1960⭐
218🍴
[Krakatau](https://github.com/Storyyeller/Krakatau)) - Java decompiler,
assembler, and disassembler.
* [Malzilla](http://malzilla.sourceforge.net/) - Analyze malicious web pages.
*428⭐
91🍴
[RABCDAsm](https://github.com/CyberShadow/RABCDAsm)) - A "Robust
ActionScript Bytecode Disassembler."
* 🌎 [SWF Investigator](labs.adobe.com/technologies/swfinvestigator/) -
Static and dynamic analysis of SWF applications.
* [swftools](http://www.swftools.org/) - Tools for working with Adobe Flash
files.
* [xxxswf](http://hooked-on-mnemonics.blogspot.com/2011/12/xxxswfpy.html) - A
Python script for analyzing Flash files.## Documents and Shellcode
*Analyze malicious JS and shellcode from PDFs and Office documents. See also
the [browser malware](#browser-malware) section.**
173⭐
41🍴
[AnalyzePDF](https://github.com/hiddenillusion/AnalyzePDF)) - A tool for
analyzing PDFs and attempting to determine whether they are malicious.
*609⭐
85🍴
[box-js](https://github.com/CapacitorSet/box-js)) - A tool for studying JavaScript
malware, featuring JScript/WScript support and ActiveX emulation.
* [diStorm](http://www.ragestorm.net/distorm/) - Disassembler for analyzing
malicious shellcode.
* 🌎 [InQuest Deep File Inspection](labs.inquest.net/dfi) - Upload common malware lures for Deep File Inspection and heuristical analysis.
* [JS Beautifier](http://jsbeautifier.org/) - JavaScript unpacking and deobfuscation.
* [libemu](http://libemu.carnivore.it/) - Library and tools for x86 shellcode
emulation.
*51⭐
16🍴
[malpdfobj](https://github.com/9b/malpdfobj)) - Deconstruct malicious PDFs
into a JSON representation.
* [OfficeMalScanner](http://www.reconstructer.org/code.html) - Scan for
malicious traces in MS Office documents.
* [olevba](http://www.decalage.info/python/olevba) - A script for parsing OLE
and OpenXML documents and extracting useful information.
* 🌎 [Origami PDF](code.google.com/archive/p/origami-pdf) - A tool for
analyzing malicious PDFs, and more.
* 🌎 [PDF Tools](blog.didierstevens.com/programs/pdf-tools/) - pdfid,
pdf-parser, and more from Didier Stevens.
*34⭐
9🍴
[PDF X-Ray Lite](https://github.com/9b/pdfxray_lite)) - A PDF analysis tool,
the backend-free version of PDF X-RAY.
* [peepdf](http://eternal-todo.com/tools/peepdf-pdf-analysis-tool) - Python
tool for exploring possibly malicious PDFs.
* 🌎 [QuickSand](www.quicksand.io/) - QuickSand is a compact C framework
to analyze suspected malware documents to identify exploits in streams of different
encodings and to locate and extract embedded executables.
* 🌎 [Spidermonkey](developer.mozilla.org/en-US/docs/Mozilla/Projects/SpiderMonkey) -
Mozilla's JavaScript engine, for debugging malicious JS.## File Carving
*For extracting files from inside disk and memory images.*
*
1056⭐
185🍴
[bulk_extractor](https://github.com/simsong/bulk_extractor)) - Fast file
carving tool.
*176⭐
24🍴
[EVTXtract](https://github.com/williballenthin/EVTXtract)) - Carve Windows
Event Log files from raw binary data.
* [Foremost](http://foremost.sourceforge.net/) - File carving tool designed
by the US Air Force.
*600⭐
70🍴
[hachoir3](https://github.com/vstinner/hachoir3)) - Hachoir is a Python library
to view and edit a binary stream field by field.
*614⭐
101🍴
[Scalpel](https://github.com/sleuthkit/scalpel)) - Another data carving
tool.
*82⭐
48🍴
[SFlock](https://github.com/jbremer/sflock)) - Nested archive
extraction/unpacking (used in Cuckoo Sandbox).## Deobfuscation
*Reverse XOR and other code obfuscation methods.*
* 🌎 [Balbuzard](bitbucket.org/decalage/balbuzard/wiki/Home) - A malware
analysis tool for reversing obfuscation (XOR, ROL, etc) and more.
*6843⭐
2671🍴
[de4dot](https://github.com/0xd4d/de4dot)) - .NET deobfuscator and
unpacker.
* [ex_pe_xor](http://hooked-on-mnemonics.blogspot.com/2014/04/expexorpy.html)
& [iheartxor](http://hooked-on-mnemonics.blogspot.com/p/iheartxor.html) -
Two tools from Alexander Hanel for working with single-byte XOR encoded
files.
*3132⭐
445🍴
[FLOSS](https://github.com/fireeye/flare-floss)) - The FireEye Labs Obfuscated
String Solver uses advanced static analysis techniques to automatically
deobfuscate strings from malware binaries.
*84⭐
20🍴
[NoMoreXOR](https://github.com/hiddenillusion/NoMoreXOR)) - Guess a 256 byte
XOR key using frequency analysis.
*264⭐
72🍴
[PackerAttacker](https://github.com/BromiumLabs/PackerAttacker)) - A generic
hidden code extractor for Windows malware.
*2726⭐
598🍴
[PyInstaller Extractor](https://github.com/extremecoders-re/pyinstxtractor)) -
A Python script to extract the contents of a PyInstaller generated Windows
executable file. The contents of the pyz file (usually pyc files) present
inside the executable are also extracted and automatically fixed so that a
Python bytecode decompiler will recognize it.
*?⭐
?🍴
[uncompyle6](https://github.com/rocky/python-uncompyle6/)) - A cross-version
Python bytecode decompiler. Translates Python bytecode back into equivalent
Python source code.
*632⭐
76🍴
[un{i}packer](https://github.com/unipacker/unipacker)) - Automatic and
platform-independent unpacker for Windows binaries based on emulation.
*?⭐
?🍴
[unpacker](https://github.com/malwaremusings/unpacker/)) - Automated malware
unpacker for Windows malware based on WinAppDbg.
*?⭐
?🍴
[unxor](https://github.com/tomchop/unxor/)) - Guess XOR keys using
known-plaintext attacks.
*126⭐
24🍴
[VirtualDeobfuscator](https://github.com/jnraber/VirtualDeobfuscator)) -
Reverse engineering tool for virtualization wrappers.
* [XORBruteForcer](http://eternal-todo.com/var/scripts/xorbruteforcer) -
A Python script for brute forcing single-byte XOR keys.
* 🌎 [XORSearch & XORStrings](blog.didierstevens.com/programs/xorsearch/) -
A couple programs from Didier Stevens for finding XORed data.
*1364⭐
170🍴
[xortool](https://github.com/hellman/xortool)) - Guess XOR key length, as
well as the key itself.## Debugging and Reverse Engineering
*Disassemblers, debuggers, and other static and dynamic analysis tools.*
*
7397⭐
1067🍴
[angr](https://github.com/angr/angr)) - Platform-agnostic binary analysis
framework developed at UCSB's Seclab.
*?⭐
?🍴
[bamfdetect](https://github.com/bwall/bamfdetect)) - Identifies and extracts
information from bots and other malware.
*2035⭐
274🍴
[BAP](https://github.com/BinaryAnalysisPlatform/bap)) - Multiplatform and
open source (MIT) binary analysis framework developed at CMU's Cylab.
*1405⭐
182🍴
[BARF](https://github.com/programa-stic/barf-project)) - Multiplatform, open
source Binary Analysis and Reverse engineering Framework.
*2867⭐
453🍴
[binnavi](https://github.com/google/binnavi)) - Binary analysis IDE for
reverse engineering based on graph visualization.
* 🌎 [Binary ninja](binary.ninja/) - A reversing engineering platform
that is an alternative to IDA.
*10452⭐
1505🍴
[Binwalk](https://github.com/devttys0/binwalk)) - Firmware analysis tool.
*121⭐
22🍴
[BluePill](https://github.com/season-lab/bluepill)) - Framework for executing and debugging evasive malware and protected executables.
*7254⭐
1534🍴
[Capstone](https://github.com/aquynh/capstone)) - Disassembly framework for
binary analysis and reversing, with support for many architectures and
bindings in several languages.
*42⭐
6🍴
[codebro](https://github.com/hugsy/codebro)) - Web based code browser using
clang to provide basic code analysis.
*?⭐
?🍴
[Cutter](https://github.com/radareorg/cutter)) - GUI for Radare2.
*794⭐
169🍴
[DECAF (Dynamic Executable Code Analysis Framework)](https://github.com/sycurelab/DECAF))
- A binary analysis platform based on QEMU. DroidScope is now an extension to DECAF.
*26154⭐
5023🍴
[dnSpy](https://github.com/0xd4d/dnSpy)) - .NET assembly editor, decompiler
and debugger.
* 🌎 [dotPeek](www.jetbrains.com/decompiler/) - Free .NET Decompiler and
Assembly Browser.
* [Evan's Debugger (EDB)](http://codef00.com/projects#debugger) - A
modular debugger with a Qt GUI.
*2124⭐
184🍴
[Fibratus](https://github.com/rabbitstack/fibratus)) - Tool for exploration
and tracing of the Windows kernel.
* 🌎 [FPort](www.mcafee.com/us/downloads/free-tools/fport.aspx) - Reports
open TCP/IP and UDP ports in a live system and maps them to the owning application.
* [GDB](http://www.sourceware.org/gdb/) - The GNU debugger.
*6728⭐
720🍴
[GEF](https://github.com/hugsy/gef)) - GDB Enhanced Features, for exploiters
and reverse engineers.
*49893⭐
5732🍴
[Ghidra](https://github.com/NationalSecurityAgency/ghidra)) - A software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate.
*167⭐
19🍴
[hackers-grep](https://github.com/codypierce/hackers-grep)) - A utility to
search for strings in PE executables including imports, exports, and debug
symbols.
* 🌎 [Hopper](www.hopperapp.com/) - The macOS and Linux Disassembler.
* 🌎 [IDA Pro](www.hex-rays.com/products/ida/index.shtml) - Windows
disassembler and debugger, with a free evaluation version.
*928⭐
222🍴
[IDR](https://github.com/crypto2011/IDR)) - Interactive Delphi Reconstructor
is a decompiler of Delphi executable files and dynamic libraries.
* [Immunity Debugger](http://debugger.immunityinc.com/) - Debugger for
malware analysis and more, with a Python API.
* [ILSpy](http://ilspy.net/) - ILSpy is the open-source .NET assembly browser and decompiler.
* [Kaitai Struct](http://kaitai.io/) - DSL for file formats / network protocols /
data structures reverse engineering and dissection, with code generation
for C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
* 🌎 [LIEF](lief.quarkslab.com/) - LIEF provides a cross-platform library
to parse, modify and abstract ELF, PE and MachO formats.
* [ltrace](http://ltrace.org/) - Dynamic analysis for Linux executables.
*82⭐
24🍴
[mac-a-mal](https://github.com/phdphuc/mac-a-mal)) - An automated framework
for mac malware hunting.
* 🌎 [objdump](en.wikipedia.org/wiki/Objdump) - Part of GNU binutils,
for static analysis of Linux binaries.
* [OllyDbg](http://www.ollydbg.de/) - An assembly-level debugger for Windows
executables.
* 🌎 [OllyDumpEx](low-priority.appspot.com/ollydumpex/) - Dump memory
from (unpacked) malware Windows process and store raw or rebuild PE file.
This is a plugin for OllyDbg, Immunity Debugger, IDA Pro, WinDbg, and x64dbg.
*102⭐
42🍴
[PANDA](https://github.com/moyix/panda)) - Platform for Architecture-Neutral
Dynamic Analysis.
*5821⭐
800🍴
[PEDA](https://github.com/longld/peda)) - Python Exploit Development
Assistance for GDB, an enhanced display with added commands.
* 🌎 [pestudio](winitor.com/) - Perform static analysis of Windows
executables.
*1512⭐
187🍴
[Pharos](https://github.com/cmu-sei/pharos)) - The Pharos binary analysis framework
can be used to perform automated static analysis of binaries.
*3049⭐
278🍴
[plasma](https://github.com/plasma-disassembler/plasma)) - Interactive
disassembler for x86/ARM/MIPS.
* 🌎 [PPEE (puppy)](www.mzrst.com/) - A Professional PE file Explorer for
reversers, malware researchers and those who want to statically inspect PE
files in more detail.
* 🌎 [Process Explorer](docs.microsoft.com/en-us/sysinternals/downloads/process-explorer) -
Advanced task manager for Windows.
* [Process Hacker](http://processhacker.sourceforge.net/) - Tool that monitors
system resources.
* 🌎 [Process Monitor](docs.microsoft.com/en-us/sysinternals/downloads/procmon) -
Advanced monitoring tool for Windows programs.
* 🌎 [PSTools](docs.microsoft.com/en-us/sysinternals/downloads/pstools) - Windows
command-line tools that help manage and investigate live systems.
*381⭐
95🍴
[Pyew](https://github.com/joxeankoret/pyew)) - Python tool for malware
analysis.
*1648⭐
250🍴
[PyREBox](https://github.com/Cisco-Talos/pyrebox)) - Python scriptable reverse
engineering sandbox by the Talos team at Cisco.
* 🌎 [Qiling Framework](www.qiling.io/) - Cross platform emulation and sanboxing
framework with instruments for binary analysis.
*?⭐
?🍴
[QKD](https://github.com/ispras/qemu/releases/)) - QEMU with embedded WinDbg
server for stealth debugging.
* [Radare2](http://www.radare.org/r/) - Reverse engineering framework, with
debugger support.
* 🌎 [RegShot](sourceforge.net/projects/regshot/) - Registry compare utility
that compares snapshots.
* 🌎 [RetDec](retdec.com/) - Retargetable machine-code decompiler with an
🌎 [online decompilation service](retdec.com/decompilation/) and
🌎 [API](retdec.com/api/) that you can use in your tools.
*283⭐
46🍴
[ROPMEMU](https://github.com/Cisco-Talos/ROPMEMU)) - A framework to analyze, dissect
and decompile complex code-reuse attacks.
*1063⭐
224🍴
[Scylla Imports Reconstructor](https://github.com/NtQuery/Scylla)) - Find and fix
the IAT of an unpacked / dumped PE32 malware.
*3361⭐
420🍴
[ScyllaHide](https://github.com/x64dbg/ScyllaHide)) - An Anti-Anti-Debug library
and plugin for OllyDbg, x64dbg, IDA Pro, and TitanEngine.
*64⭐
15🍴
[SMRT](https://github.com/pidydx/SMRT)) - Sublime Malware Research Tool, a
plugin for Sublime 3 to aid with malware analyis.
* 🌎 [strace](sourceforge.net/projects/strace/) - Dynamic analysis for
Linux executables.
*669⭐
127🍴
[StringSifter](https://github.com/fireeye/stringsifter)) - A machine learning tool
that automatically ranks strings based on their relevance for malware analysis.
* 🌎 [Triton](triton.quarkslab.com/) - A dynamic binary analysis (DBA) framework.
*1004⭐
298🍴
[Udis86](https://github.com/vmt/udis86)) - Disassembler library and tool
for x86 and x86_64.
*919⭐
185🍴
[Vivisect](https://github.com/vivisect/vivisect)) - Python tool for
malware analysis.
* 🌎 [WinDbg](developer.microsoft.com/en-us/windows/hardware/download-windbg) - multipurpose debugger for the Microsoft Windows computer operating system, used to debug user mode applications, device drivers, and the kernel-mode memory dumps.
*?⭐
?🍴
[X64dbg](https://github.com/x64dbg/)) - An open-source x64/x32 debugger for windows.## Network
*Analyze network interactions.*
* 🌎 [Bro](www.bro.org) - Protocol analyzer that operates at incredible
scale; both file and network protocols.
*31⭐
5🍴
[BroYara](https://github.com/hempnall/broyara)) - Use Yara rules from Bro.
*707⭐
160🍴
[CapTipper](https://github.com/omriher/CapTipper)) - Malicious HTTP traffic
explorer.
*487⭐
112🍴
[chopshop](https://github.com/MITRECND/chopshop)) - Protocol analysis and
decoding framework.
* 🌎 [CloudShark](www.cloudshark.org) - Web-based tool for packet analysis
and malware traffic detection.
*1746⭐
357🍴
[FakeNet-NG](https://github.com/fireeye/flare-fakenet-ng)) - Next generation
dynamic network analysis tool.
* 🌎 [Fiddler](www.telerik.com/fiddler) - Intercepting web proxy designed
for "web debugging."
*184⭐
64🍴
[Hale](https://github.com/pjlantz/Hale)) - Botnet C&C monitor.
* [Haka](http://www.haka-security.org/) - An open source security oriented
language for describing protocols and applying security policies on (live)
captured traffic.
*94⭐
35🍴
[HTTPReplay](https://github.com/jbremer/httpreplay)) - Library for parsing
and reading out PCAP files, including TLS streams using TLS Master Secrets
(used in Cuckoo Sandbox).
* [INetSim](http://www.inetsim.org/) - Network service emulation, useful when
building a malware lab.
*727⭐
155🍴
[Laika BOSS](https://github.com/lmco/laikaboss)) - Laika BOSS is a file-centric
malware analysis and intrusion detection system.
*335⭐
57🍴
[Malcolm](https://github.com/idaholab/Malcolm)) - Malcolm is a powerful, easily
deployable network traffic analysis tool suite for full packet capture artifacts
(PCAP files) and Zeek logs.
*1148⭐
215🍴
[Malcom](https://github.com/tomchop/malcom)) - Malware Communications
Analyzer.
*6210⭐
1052🍴
[Maltrail](https://github.com/stamparm/maltrail)) - A malicious traffic
detection system, utilizing publicly available (black)lists containing
malicious and/or generally suspicious trails and featuring an reporting
and analysis interface.
* 🌎 [mitmproxy](mitmproxy.org/) - Intercept network traffic on the fly.
*6226⭐
1037🍴
[Moloch](https://github.com/aol/moloch)) - IPv4 traffic capturing, indexing
and database system.
* [NetworkMiner](http://www.netresec.com/?page=NetworkMiner) - Network
forensic analysis tool, with a free version.
*871⭐
100🍴
[ngrep](https://github.com/jpr5/ngrep)) - Search through network traffic
like grep.
*332⭐
59🍴
[PcapViz](https://github.com/mateuszk87/PcapViz)) - Network topology and
traffic visualizer.
*56⭐
13🍴
[Python ICAP Yara](https://github.com/RamadhanAmizudin/python-icap-yara)) - An
ICAP Server with yara scanner for URL or content.
*76⭐
27🍴
[Squidmagic](https://github.com/ch3k1/squidmagic)) - squidmagic is a tool
designed to analyze a web-based network traffic to detect central command
and control (C&C) servers and malicious sites, using Squid proxy server and
Spamhaus.
* [Tcpdump](http://www.tcpdump.org/) - Collect network traffic.
* [tcpick](http://tcpick.sourceforge.net/) - Trach and reassemble TCP streams
from network traffic.
* [tcpxtract](http://tcpxtract.sourceforge.net/) - Extract files from network
traffic.
* 🌎 [Wireshark](www.wireshark.org/) - The network traffic analysis
tool.## Memory Forensics
*Tools for dissecting malware in memory images or running systems.*
* 🌎 [BlackLight](www.blackbagtech.com/blacklight.html) - Windows/MacOS
forensics client supporting hiberfil, pagefile, raw memory analysis.
*209⭐
50🍴
[DAMM](https://github.com/504ensicsLabs/DAMM)) - Differential Analysis of
Malware in Memory, built on Volatility.
*259⭐
42🍴
[evolve](https://github.com/JamesHabben/evolve)) - Web interface for the
Volatility Memory Forensics Framework.
* 🌎 [FindAES](sourceforge.net/projects/findaes/) - Find AES
encryption keys in memory.
*278⭐
57🍴
[inVtero.net](https://github.com/ShaneK2/inVtero.net)) - High speed memory
analysis framework developed in .NET supports all Windows x64, includes
code integrity and write support.
*51⭐
9🍴
[Muninn](https://github.com/ytisf/muninn)) - A script to automate portions
of analysis using Volatility, and create a readable report.
211⭐
20🍴
[Orochi](https://github.com/LDO-CERT/orochi)) - Orochi is an open source framework for
collaborative forensic memory dump analysis.
* [Rekall](http://www.rekall-forensic.com/) - Memory analysis framework,
forked from Volatility in 2013.
*49⭐
9🍴
[TotalRecall](https://github.com/sketchymoose/TotalRecall)) - Script based
on Volatility for automating various malware analysis tasks.
*192⭐
50🍴
[VolDiff](https://github.com/aim4r/VolDiff)) - Run Volatility on memory
images before and after malware execution, and report changes.
*7125⭐
1264🍴
[Volatility](https://github.com/volatilityfoundation/volatility)) - Advanced
memory forensics framework.
*377⭐
83🍴
[VolUtility](https://github.com/kevthehermit/VolUtility)) - Web Interface for
Volatility Memory Analysis framework.
*611⭐
178🍴
[WDBGARK](https://github.com/swwwolf/wdbgark)) -
WinDBG Anti-RootKit Extension.
* 🌎 [WinDbg](developer.microsoft.com/en-us/windows/hardware/windows-driver-kit) -
Live memory inspection and kernel debugging for Windows systems.## Windows Artifacts
*
179⭐
31🍴
[AChoir](https://github.com/OMENScan/AChoir)) - A live incident response
script for gathering Windows artifacts.
*46⭐
11🍴
[python-evt](https://github.com/williballenthin/python-evt)) - Python
library for parsing Windows Event Logs.
* [python-registry](http://www.williballenthin.com/registry/) - Python
library for parsing registry files.
* [RegRipper](http://brettshavers.cc/index.php/brettsblog/tags/tag/regripper/)
(?⭐
?🍴
[GitHub](https://github.com/keydet89/RegRipper2.8))) -
Plugin-based registry analysis tool.## Storage and Workflow
*
156⭐
53🍴
[Aleph](https://github.com/merces/aleph)) - Open Source Malware Analysis
Pipeline System.
* 🌎 [CRITs](crits.github.io/) - Collaborative Research Into Threats, a
malware and threat repository.
* 🌎 [FAME](certsocietegenerale.github.io/fame/) - A malware analysis
framework featuring a pipeline that can be extended with custom modules,
which can be chained and interact with each other to perform end-to-end
analysis.
*131⭐
43🍴
[Malwarehouse](https://github.com/sroberts/malwarehouse)) - Store, tag, and
search malware.
*373⭐
60🍴
[Polichombr](https://github.com/ANSSI-FR/polichombr)) - A malware analysis
platform designed to help analysts to reverse malwares collaboratively.
* [stoQ](http://stoq.punchcyber.com) - Distributed content analysis
framework with extensive plugin support, from input to output, and everything
in between.
* [Viper](http://viper.li/) - A binary management and analysis framework for
analysts and researchers.## Miscellaneous
*
5730⭐
1158🍴
[al-khaser](https://github.com/LordNoteworthy/al-khaser)) - A PoC malware
with good intentions that aimes to stress anti-malware systems.
*38⭐
12🍴
[CryptoKnight](https://github.com/AbertayMachineLearningGroup/CryptoKnight)) - Automated cryptographic algorithm reverse engineering and classification framework.
*291⭐
59🍴
[DC3-MWCP](https://github.com/Defense-Cyber-Crime-Center/DC3-MWCP)) -
The Defense Cyber Crime Center's Malware Configuration Parser framework.
*6251⭐
887🍴
[FLARE VM](https://github.com/fireeye/flare-vm)) - A fully customizable,
Windows-based, security distribution for malware analysis.
*531⭐
199🍴
[MalSploitBase](https://github.com/misterch0c/malSploitBase)) - A database
containing exploits used by malware.
* 🌎 [Malware Museum](archive.org/details/malwaremuseum) - Collection of
malware programs that were distributed in the 1980s and 1990s.
*0⭐
0🍴
[Malware Organiser](https://github.com/uppusaikiran/malware-organiser)) - A simple tool to organise large malicious/benign files into a organised Structure.
*3271⭐
455🍴
[Pafish](https://github.com/a0rtega/pafish)) - Paranoid Fish, a demonstration
tool that employs several techniques to detect sandboxes and analysis
environments in the same way as malware families do.
* 🌎 [REMnux](remnux.org/) - Linux distribution and docker images for
malware reverse engineering and analysis.
* 🌎 [Tsurugi Linux](tsurugi-linux.org/) - Linux distribution designed to support your DFIR investigations, malware analysis and OSINT (Open Source INTelligence) activities.
* 🌎 [Santoku Linux](santoku-linux.com/) - Linux distribution for mobile
forensics, malware analysis, and security.# Resources
## Books
*Essential malware analysis reading material.*
* 🌎 [Learning Malware Analysis](www.packtpub.com/networking-and-servers/learning-malware-analysis) - Learning Malware Analysis: Explore the concepts, tools, and techniques to analuze and investigate Windows malware
* 🌎 [Malware Analyst's Cookbook and DVD](amzn.com/dp/0470613033) -
Tools and Techniques for Fighting Malicious Code.
* 🌎 [Mastering Malware Analysis](www.packtpub.com/networking-and-servers/mastering-malware-analysis) - Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercime, and IoT attacks
* 🌎 [Mastering Reverse Engineering](www.packtpub.com/networking-and-servers/mastering-reverse-engineering) - Mastering Reverse Engineering: Re-engineer your ethical hacking skills
* 🌎 [Practical Malware Analysis](amzn.com/dp/1593272901) - The Hands-On
Guide to Dissecting Malicious Software.
* 🌎 [Practical Reverse Engineering](www.amzn.com/dp/1118787315/) -
Intermediate Reverse Engineering.
* 🌎 [Real Digital Forensics](www.amzn.com/dp/0321240693) - Computer
Security and Incident Response.
* 🌎 [Rootkits and Bootkits](www.amazon.com/dp/1593277164) - Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
* 🌎 [The Art of Memory Forensics](amzn.com/dp/1118825098) - Detecting
Malware and Threats in Windows, Linux, and Mac Memory.
* 🌎 [The IDA Pro Book](amzn.com/dp/1593272898) - The Unofficial Guide
to the World's Most Popular Disassembler.
* 🌎 [The Rootkit Arsenal](amzn.com/dp/144962636X) - The Rootkit Arsenal:
Escape and Evasion in the Dark Corners of the System## Other
*
1638⭐
275🍴
[APT Notes](https://github.com/aptnotes/data)) - A collection of papers
and notes related to Advanced Persistent Threats.
*922⭐
274🍴
[Ember](https://github.com/endgameinc/ember)) - Endgame Malware BEnchmark for Research,
a repository that makes it easy to (re)create a machine learning model that can be used
to predict a score for a PE file based on static analysis.
*10420⭐
739🍴
[File Formats posters](https://github.com/corkami/pics)) - Nice visualization
of commonly used file format (including PE & ELF).
* [Honeynet Project](http://honeynet.org/) - Honeypot tools, papers, and
other resources.
* [Kernel Mode](http://www.kernelmode.info/forum/) - An active community
devoted to malware analysis and kernel development.
* 🌎 [Malicious Software](zeltser.com/malicious-software/) - Malware
blog and resources by Lenny Zeltser.
* 🌎 [Malware Analysis Search](cse.google.com/cse/home?cx=011750002002865445766%3Apc60zx1rliu) -
Custom Google search engine from [Corey Harrell](journeyintoir.blogspot.com/).
* [Malware Analysis Tutorials](http://fumalwareanalysis.blogspot.nl/p/malware-analysis-tutorials-reverse.html) -
The Malware Analysis Tutorials by Dr. Xiang Fu, a great resource for learning
practical malware analysis.
* 🌎 [Malware Analysis, Threat Intelligence and Reverse Engineering](www.slideshare.net/bartblaze/malware-analysis-threat-intelligence-and-reverse-engineering) -
Presentation introducing the concepts of malware analysis, threat intelligence
and reverse engineering. Experience or prior knowledge is not required. Labs
link in description.
*162⭐
16🍴
[Malware Persistence](https://github.com/Karneades/malware-persistence)) - Collection
of various information focused on malware persistence: detection (techniques),
response, pitfalls and the log collection (tools).
* [Malware Samples and Traffic](http://malware-traffic-analysis.net/) - This
blog focuses on network traffic related to malware infections.
* 🌎 [Malware Search+++](addons.mozilla.org/fr/firefox/addon/malware-search-plusplusplus/) Firefox extension allows
you to easily search some of the most popular malware databases
* 🌎 [Practical Malware Analysis Starter Kit](bluesoul.me/practical-malware-analysis-starter-kit/) -
This package contains most of the software referenced in the Practical Malware
Analysis book.
*3701⭐
779🍴
[RPISEC Malware Analysis](https://github.com/RPISEC/Malware)) - These are the
course materials used in the Malware Analysis course at at Rensselaer Polytechnic
Institute during Fall 2015.
* [WindowsIR: Malware](http://windowsir.blogspot.com/p/malware.html) - Harlan
Carvey's page on Malware.
*314⭐
67🍴
[Windows Registry specification](https://github.com/msuhanov/regf/blob/master/Windows%20registry%20file%20format%20specification.md)) -
Windows registry file format specification.
* 🌎 [/r/csirt_tools](www.reddit.com/r/csirt_tools/) - Subreddit for CSIRT
tools and resources, with a
🌎 [malware analysis](www.reddit.com/r/csirt_tools/search?q=flair%3A%22Malware%20analysis%22&sort=new&restrict_sr=on) flair.
* 🌎 [/r/Malware](www.reddit.com/r/Malware) - The malware subreddit.
* 🌎 [/r/ReverseEngineering](www.reddit.com/r/ReverseEngineering) -
Reverse engineering subreddit, not limited to just malware.# Related Awesome Lists
*
7961⭐
1434🍴
[Android Security](https://github.com/ashishb/android-security-awesome))
*6225⭐
732🍴
[AppSec](https://github.com/paragonie/awesome-appsec))
*9497⭐
1465🍴
[CTFs](https://github.com/apsdehal/awesome-ctf))
*1149⭐
99🍴
[Executable Packing](https://github.com/dhondta/awesome-executable-packing))
*3772⭐
603🍴
[Forensics](https://github.com/Cugu/awesome-forensics))
*12639⭐
1523🍴
["Hacking"](https://github.com/carpedm20/awesome-hacking))
*8345⭐
1237🍴
[Honeypots](https://github.com/paralax/awesome-honeypots))
*1567⭐
424🍴
[Industrial Control System Security](https://github.com/hslatman/awesome-industrial-control-system-security))
*7430⭐
1508🍴
[Incident-Response](https://github.com/meirwah/awesome-incident-response))
*5088⭐
735🍴
[Infosec](https://github.com/onlurking/awesome-infosec))
*3058⭐
466🍴
[PCAP Tools](https://github.com/caesar0301/awesome-pcaptools))
*21171⭐
4427🍴
[Pentesting](https://github.com/enaqx/awesome-pentest))
*11981⭐
1882🍴
[Security](https://github.com/sbilly/awesome-security))
*7719⭐
1444🍴
[Threat Intelligence](https://github.com/hslatman/awesome-threat-intelligence))
*3417⭐
483🍴
[YARA](https://github.com/InQuest/awesome-yara))# [Contributing](CONTRIBUTING.md)
Pull requests and issues with suggestions are welcome! Please read the
[CONTRIBUTING](CONTRIBUTING.md) guidelines before submitting a PR.# Thanks
This list was made possible by:
* Lenny Zeltser and other contributors for developing REMnux, where I
found many of the tools in this list;
* Michail Hale Ligh, Steven Adair, Blake Hartstein, and Mather Richard for
writing the *Malware Analyst's Cookbook*, which was a big inspiration for
creating the list;
* And everyone else who has sent pull requests or suggested links to add here!Thanks!
## Source
11469⭐
2532🍴
[rshipp/awesome-malware-analysis](https://github.com/rshipp/awesome-malware-analysis))