[Tools][Malware Analysis] fireeye/flashmingo

This commit is contained in:
pe3zx 2019-04-16 01:19:29 +07:00 committed by GitHub
parent d6d9a627f0
commit ee360c0d29
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1729,6 +1729,10 @@ _return-to-libc techniques_
<td><a href="https://certsocietegenerale.github.io/fame/">FAME</a></td>
<td>FAME Automates Malware Evaluation</td>
</tr>
<tr>
<td><a href="https://github.com/fireeye/flashmingo">fireeye/flashmingo</a></td>
<td>Automatic analysis of SWF files based on some heuristics. Extensible via plugins.</td>
</tr>
<tr>
<td><a href="https://github.com/felixweyne/imaginaryC2">felixweyne/imaginaryC2</a></td>
<td>Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.</td>