mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-09-28 17:15:56 +00:00
Compare commits
5 Commits
e6dc8b9672
...
693d88d533
Author | SHA1 | Date | |
---|---|---|---|
|
693d88d533 | ||
|
73a5b0c76c | ||
|
8541aedf3f | ||
|
4790b43f92 | ||
|
8de1241052 |
@ -222,8 +222,7 @@ View Chinese translation: [恶意软件分析大合集.md](恶意软件分析大
|
|||||||
|
|
||||||
* [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Wrapper for a
|
* [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Wrapper for a
|
||||||
variety of tools for reporting on Windows PE files.
|
variety of tools for reporting on Windows PE files.
|
||||||
* [Assemblyline](https://bitbucket.org/cse-assemblyline/assemblyline) - A scalable
|
* [Assemblyline](https://cybercentrecanada.github.io/assemblyline4_docs/) - A scalable file triage and malware analysis system integrating the cyber security community's best tools..
|
||||||
distributed file analysis framework.
|
|
||||||
* [BinaryAlert](https://github.com/airbnb/binaryalert) - An open source, serverless
|
* [BinaryAlert](https://github.com/airbnb/binaryalert) - An open source, serverless
|
||||||
AWS pipeline that scans and alerts on uploaded files based on a set of
|
AWS pipeline that scans and alerts on uploaded files based on a set of
|
||||||
YARA rules.
|
YARA rules.
|
||||||
@ -304,6 +303,9 @@ executables.
|
|||||||
traffic analysis of Linux malwares and capturing IOCs.
|
traffic analysis of Linux malwares and capturing IOCs.
|
||||||
* [DRAKVUF](https://github.com/tklengyel/drakvuf) - Dynamic malware analysis
|
* [DRAKVUF](https://github.com/tklengyel/drakvuf) - Dynamic malware analysis
|
||||||
system.
|
system.
|
||||||
|
* [Filescan](https://www.filescan.io/scan) - FileScan.IO is a free malware analysis service that offers rapid in-depth file assesments, threat intelligence and
|
||||||
|
indicator of compromise (IOCs) extraction for a wide range of executable
|
||||||
|
files, documents and scripts.
|
||||||
* [firmware.re](http://firmware.re/) - Unpacks, scans and analyzes almost any
|
* [firmware.re](http://firmware.re/) - Unpacks, scans and analyzes almost any
|
||||||
firmware package.
|
firmware package.
|
||||||
* [HaboMalHunter](https://github.com/Tencent/HaboMalHunter) - An Automated Malware
|
* [HaboMalHunter](https://github.com/Tencent/HaboMalHunter) - An Automated Malware
|
||||||
|
@ -153,7 +153,7 @@
|
|||||||
*反病毒和其他恶意软件识别工具*
|
*反病毒和其他恶意软件识别工具*
|
||||||
|
|
||||||
* [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Windows PE 文件的分析器
|
* [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Windows PE 文件的分析器
|
||||||
* [Assemblyline](https://bitbucket.org/cse-assemblyline/assemblyline) - 大规模分布式文件分析框架
|
* [Assemblyline](https://cybercentrecanada.github.io/assemblyline4_docs/) - 大规模分布式文件分析框架
|
||||||
* [BinaryAlert](https://github.com/airbnb/binaryalert) - 开源、无服务 AWS 管道,用于对上传的文件使用 YARA 进行扫描和报警
|
* [BinaryAlert](https://github.com/airbnb/binaryalert) - 开源、无服务 AWS 管道,用于对上传的文件使用 YARA 进行扫描和报警
|
||||||
* [capa](https://github.com/fireeye/capa) - 检测可执行文件的攻击能力
|
* [capa](https://github.com/fireeye/capa) - 检测可执行文件的攻击能力
|
||||||
* [chkrootkit](http://www.chkrootkit.org/) - 本地 Linux rootkit 检测
|
* [chkrootkit](http://www.chkrootkit.org/) - 本地 Linux rootkit 检测
|
||||||
|
Loading…
Reference in New Issue
Block a user