Malware Analysis
Contents
Malware Collection
Honeypots
Open Source Threat Intelligence
Tools
An open-source framework for receiving and redistributing abuse feeds and threat intel.
Tool to gather Threat Intelligence indicators from publicly available sources.
Advanced Indicator of Compromise (IOC) extractor, Python library and command-line tool.
Malware/IOC ingestion and processing engine, that enriches collected data.
Previously known as CIF (Collective Intelligence Framework). Aggregates IOCs from various lists. Curated by the CSIRT Gadgets Foundation.
Aggregates security threats from a number of sources, including some of those listed below in other resources.
Build automated threat intel pipelines sourcing from Twitter, RSS, GitHub, and more.
Internet Storm Center (DShield)
Detection and Classification
An open source, serverless AWS pipeline that scans and alerts on uploaded files based on a set of YARA rules.
A Single Library Parser to extract meta information,static analysis and detect macros within the files.
Windows shell extension to compute hashes with a variety of algorithms.
Linker/Compiler/Tool detector for Windows, Linux and MacOS.
A tool for looking up hashes in NIST's National Software Reference Library database.
PEframe is an open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.
Java library to analyse PE files with a special focus on malware analysis and PE malformation robustness.
Generate yara rules based on a set of malware samples. Also contains a good strings DB to avoid false positives.
Debugging and Reverse Engineering
The Pharos binary analysis framework can be used to perform automated static analysis of binaries.
Multiplatform and open source (MIT) binary analysis framework developed at CMU's Cylab.
Multiplatform, open source Binary Analysis and Reverse engineering Framework.
Framework for executing and debugging evasive malware and protected executables.
Disassembly framework for binary analysis and reversing, with support for many architectures and bindings in several languages.
A binary analysis platform based on QEMU. DroidScope is now an extension to DECAF.
A software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate.
A utility to search for strings in PE executables including imports, exports, and debug symbols.
Interactive Delphi Reconstructor is a decompiler of Delphi executable files and dynamic libraries.
Python Exploit Development Assistance for GDB, an enhanced display with added commands.
A framework to analyze, dissect and decompile complex code-reuse attacks.
Find and fix the IAT of an unpacked / dumped PE32 malware.
An Anti-Anti-Debug library and plugin for OllyDbg, x64dbg, IDA Pro, and TitanEngine.
Sublime Malware Research Tool, a plugin for Sublime 3 to aid with malware analyis.
Online Scanners and Sandboxes
Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant.
Modified version of Cuckoo Sandbox released under the GPL. Not merged upstream due to legal concerns by the author.
A sandbox developed to do traffic analysis of Linux malwares and capturing IOCs.
A Python RESTful API framework for online malware and URL analysis services.
Uses Sysinternals Procmon to collect information about malware in a sandboxed environment.
Python library for building integrations with several open source and commercial malware sandboxes.
Domain Analysis
A tool designed for consistent and safe capture of off network web resources.
Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.
Browser Malware
Documents and Shellcode
File Carving
Deobfuscation
The FireEye Labs Obfuscated String Solver uses advanced static analysis techniques to automatically deobfuscate strings from malware binaries.
A Python script to extract the contents of a PyInstaller generated Windows executable file. The contents of the pyz file (usually pyc files) present inside the executable are also extracted and automatically fixed so that a Python bytecode decompiler will recognize it.
A cross-version Python bytecode decompiler. Translates Python bytecode back into equivalent Python source code.
Network
Library for parsing and reading out PCAP files, including TLS streams using TLS Master Secrets (used in Cuckoo Sandbox).
Laika BOSS is a file-centric malware analysis and intrusion detection system.
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files) and Zeek logs.
Memory Forensics
High speed memory analysis framework developed in .NET supports all Windows x64, includes code integrity and write support.
A script to automate portions of analysis using Volatility, and create a readable report.
Orochi is an open source framework for collaborative forensic memory dump analysis.
Script based on Volatility for automating various malware analysis tasks.
Windows Artifacts
Storage and Workflow
Miscellaneous
A PoC malware with good intentions that aimes to stress anti-malware systems.
Automated cryptographic algorithm reverse engineering and classification framework.
The Defense Cyber Crime Center's Malware Configuration Parser framework.
A fully customizable, Windows-based, security distribution for malware analysis.
Other
A collection of papers and notes related to Advanced Persistent Threats.
Endgame Malware BEnchmark for Research, a repository that makes it easy to (re)create a machine learning model that can be used to predict a score for a PE file based on static analysis.
Nice visualization of commonly used file format (including PE & ELF).
Collection of various information focused on malware persistence: detection (techniques), response, pitfalls and the log collection (tools).