Compare commits

...

10 Commits

Author SHA1 Message Date
Alex 2b787f6928
Merge 5ce8a4af3d into 45b56e26f0 2024-04-25 06:38:27 +02:00
Avenger 45b56e26f0
Merge pull request #225 from BlazerYoo/patch-1
openmalware.org domain has already expired.
2024-04-24 21:43:47 +08:00
Avenger a3f07a0452
Merge pull request #217 from damoklov/main
Added Qiling Framework
2024-04-19 22:41:09 +08:00
Avenger d9be38e887
Merge pull request #214 from SpeksForks/main
Updating dead link for packerid
2024-04-19 22:35:31 +08:00
Avenger 19554e7df1
Merge pull request #235 from vxsh4d0w/patch-1
Orochi is an open source framework for collaborative forensic memory dump analysis.
2024-04-18 23:17:53 +08:00
Alex 5ce8a4af3d
Add Awesome Executable Packing
Added Awesome Executable Packing to the *Related Awesome Lists*.
2022-01-13 21:23:38 +01:00
V 16e814114d
Added Orochi
Added Orochi, an open source framework for collaborative forensic memory dump analysis.
2021-12-31 09:43:50 +00:00
Boaz Yoo 3a278790eb
openmalware.org domain is for sale 2021-03-10 02:04:47 -05:00
damoklov 9dbc8c084f Added Qiling Framework 2020-10-01 20:54:32 +03:00
Peter Thaleikis 1037a22b1a
Updating dead link for packerid 2020-09-30 16:40:38 +04:00
1 changed files with 6 additions and 3 deletions

View File

@ -87,8 +87,6 @@ View Chinese translation: [恶意软件分析大合集.md](恶意软件分析大
rapid identification and actionable context for malware investigations.
* [Malshare](https://malshare.com) - Large repository of malware actively
scrapped from malicious sites.
* [Open Malware Project](http://openmalware.org/) - Sample information and
downloads. Formerly Offensive Computing.
* [Ragpicker](https://github.com/robbyFux/Ragpicker) - Plugin based malware
crawler with pre-analysis and reporting functionalities
* [theZoo](https://github.com/ytisf/theZoo) - Live malware samples for
@ -256,7 +254,7 @@ executables.
* [Nauz File Detector(NFD)](https://github.com/horsicq/Nauz-File-Detector) - Linker/Compiler/Tool detector for Windows, Linux and MacOS.
* [nsrllookup](https://github.com/rjhansen/nsrllookup) - A tool for looking
up hashes in NIST's National Software Reference Library database.
* [packerid](http://handlers.sans.org/jclausing/packerid.py) - A cross-platform
* [packerid](https://github.com/sooshie/packerid) - A cross-platform
Python alternative to PEiD.
* [PE-bear](https://hshrzd.wordpress.com/pe-bear/) - Reversing tool for PE
files.
@ -620,6 +618,8 @@ the [browser malware](#browser-malware) section.*
analysis.
* [PyREBox](https://github.com/Cisco-Talos/pyrebox) - Python scriptable reverse
engineering sandbox by the Talos team at Cisco.
* [Qiling Framework](https://www.qiling.io/) - Cross platform emulation and sanboxing
framework with instruments for binary analysis.
* [QKD](https://github.com/ispras/qemu/releases/) - QEMU with embedded WinDbg
server for stealth debugging.
* [Radare2](http://www.radare.org/r/) - Reverse engineering framework, with
@ -726,6 +726,8 @@ the [browser malware](#browser-malware) section.*
code integrity and write support.
* [Muninn](https://github.com/ytisf/muninn) - A script to automate portions
of analysis using Volatility, and create a readable report.
[Orochi](https://github.com/LDO-CERT/orochi) - Orochi is an open source framework for
collaborative forensic memory dump analysis.
* [Rekall](http://www.rekall-forensic.com/) - Memory analysis framework,
forked from Volatility in 2013.
* [TotalRecall](https://github.com/sketchymoose/TotalRecall) - Script based
@ -876,6 +878,7 @@ the [browser malware](#browser-malware) section.*
* [Android Security](https://github.com/ashishb/android-security-awesome)
* [AppSec](https://github.com/paragonie/awesome-appsec)
* [CTFs](https://github.com/apsdehal/awesome-ctf)
* [Executable Packing](https://github.com/dhondta/awesome-executable-packing)
* [Forensics](https://github.com/Cugu/awesome-forensics)
* ["Hacking"](https://github.com/carpedm20/awesome-hacking)
* [Honeypots](https://github.com/paralax/awesome-honeypots)