Compare commits
8 Commits
55f883785e
...
686f1110c3
Author | SHA1 | Date |
---|---|---|
Jason G | 686f1110c3 | |
Avenger | a3f07a0452 | |
Avenger | d9be38e887 | |
Avenger | 19554e7df1 | |
Jason G | e0c7337267 | |
V | 16e814114d | |
damoklov | 9dbc8c084f | |
Peter Thaleikis | 1037a22b1a |
|
@ -44,6 +44,7 @@ View Chinese translation: [恶意软件分析大合集.md](恶意软件分析大
|
|||
*Web traffic anonymizers for analysts.*
|
||||
|
||||
* [Anonymouse.org](http://anonymouse.org/) - A free, web based anonymizer.
|
||||
* [Firezone](https://www.firezone.dev/) - An open-source VPN server using WireGuard.
|
||||
* [OpenVPN](https://openvpn.net/) - VPN software and hosting solutions.
|
||||
* [Privoxy](http://www.privoxy.org/) - An open source proxy server with some
|
||||
privacy features.
|
||||
|
@ -256,7 +257,7 @@ executables.
|
|||
* [Nauz File Detector(NFD)](https://github.com/horsicq/Nauz-File-Detector) - Linker/Compiler/Tool detector for Windows, Linux and MacOS.
|
||||
* [nsrllookup](https://github.com/rjhansen/nsrllookup) - A tool for looking
|
||||
up hashes in NIST's National Software Reference Library database.
|
||||
* [packerid](http://handlers.sans.org/jclausing/packerid.py) - A cross-platform
|
||||
* [packerid](https://github.com/sooshie/packerid) - A cross-platform
|
||||
Python alternative to PEiD.
|
||||
* [PE-bear](https://hshrzd.wordpress.com/pe-bear/) - Reversing tool for PE
|
||||
files.
|
||||
|
@ -620,6 +621,8 @@ the [browser malware](#browser-malware) section.*
|
|||
analysis.
|
||||
* [PyREBox](https://github.com/Cisco-Talos/pyrebox) - Python scriptable reverse
|
||||
engineering sandbox by the Talos team at Cisco.
|
||||
* [Qiling Framework](https://www.qiling.io/) - Cross platform emulation and sanboxing
|
||||
framework with instruments for binary analysis.
|
||||
* [QKD](https://github.com/ispras/qemu/releases/) - QEMU with embedded WinDbg
|
||||
server for stealth debugging.
|
||||
* [Radare2](http://www.radare.org/r/) - Reverse engineering framework, with
|
||||
|
@ -726,6 +729,8 @@ the [browser malware](#browser-malware) section.*
|
|||
code integrity and write support.
|
||||
* [Muninn](https://github.com/ytisf/muninn) - A script to automate portions
|
||||
of analysis using Volatility, and create a readable report.
|
||||
[Orochi](https://github.com/LDO-CERT/orochi) - Orochi is an open source framework for
|
||||
collaborative forensic memory dump analysis.
|
||||
* [Rekall](http://www.rekall-forensic.com/) - Memory analysis framework,
|
||||
forked from Volatility in 2013.
|
||||
* [TotalRecall](https://github.com/sketchymoose/TotalRecall) - Script based
|
||||
|
|
Loading…
Reference in New Issue