Compare commits

...

8 Commits

Author SHA1 Message Date
Marco
b3654b9c4f
Merge e5d61a8121 into 19554e7df1 2024-04-19 22:14:01 +08:00
Avenger
19554e7df1
Merge pull request #235 from vxsh4d0w/patch-1
Orochi is an open source framework for collaborative forensic memory dump analysis.
2024-04-18 23:17:53 +08:00
Avenger
73a5b0c76c
Merge pull request #246 from cccs-kevin/update/AL-link
Updating the Assemblyline link and description
2024-04-15 21:39:00 +08:00
Avenger
448522ad9e
Merge pull request #219 from gothicx/patch-1
AVCaesar - Discontinued
2024-03-27 11:29:07 +08:00
cccs-kevin
8541aedf3f
Updating Assemblyline's description 2023-10-19 20:26:23 +00:00
cccs-kevin
4790b43f92
Updating the Assemblyline link 2023-10-19 20:25:00 +00:00
V
16e814114d
Added Orochi
Added Orochi, an open source framework for collaborative forensic memory dump analysis.
2021-12-31 09:43:50 +00:00
Marco Rodrigues
0e6ad32aef
AVCaesar - Discontinued 2020-10-11 20:08:32 +02:00
2 changed files with 9 additions and 10 deletions

View File

@ -222,8 +222,7 @@ View Chinese translation: [恶意软件分析大合集.md](恶意软件分析大
* [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Wrapper for a
variety of tools for reporting on Windows PE files.
* [Assemblyline](https://bitbucket.org/cse-assemblyline/assemblyline) - A scalable
distributed file analysis framework.
* [Assemblyline](https://cybercentrecanada.github.io/assemblyline4_docs/) - A scalable file triage and malware analysis system integrating the cyber security community's best tools..
* [BinaryAlert](https://github.com/airbnb/binaryalert) - An open source, serverless
AWS pipeline that scans and alerts on uploaded files based on a set of
YARA rules.
@ -288,8 +287,6 @@ executables.
* [any.run](https://app.any.run/) - Online interactive sandbox.
* [AndroTotal](https://andrototal.org/) - Free online analysis of APKs
against multiple mobile antivirus apps.
* [AVCaesar](https://avcaesar.malware.lu/) - Malware.lu online scanner and
malware repository.
* [BoomBox](https://github.com/nbeede/BoomBox) - Automatic deployment of Cuckoo
Sandbox malware lab using Packer and Vagrant.
* [Cryptam](http://www.cryptam.com/) - Analyze suspicious office documents.
@ -731,6 +728,8 @@ the [browser malware](#browser-malware) section.*
code integrity and write support.
* [Muninn](https://github.com/ytisf/muninn) - A script to automate portions
of analysis using Volatility, and create a readable report.
[Orochi](https://github.com/LDO-CERT/orochi) - Orochi is an open source framework for
collaborative forensic memory dump analysis.
* [Rekall](http://www.rekall-forensic.com/) - Memory analysis framework,
forked from Volatility in 2013.
* [TotalRecall](https://github.com/sketchymoose/TotalRecall) - Script based

View File

@ -153,7 +153,7 @@
*反病毒和其他恶意软件识别工具*
* [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Windows PE 文件的分析器
* [Assemblyline](https://bitbucket.org/cse-assemblyline/assemblyline) - 大规模分布式文件分析框架
* [Assemblyline](https://cybercentrecanada.github.io/assemblyline4_docs/) - 大规模分布式文件分析框架
* [BinaryAlert](https://github.com/airbnb/binaryalert) - 开源、无服务 AWS 管道,用于对上传的文件使用 YARA 进行扫描和报警
* [capa](https://github.com/fireeye/capa) - 检测可执行文件的攻击能力
* [chkrootkit](http://www.chkrootkit.org/) - 本地 Linux rootkit 检测