sheep-wolf – Exploit MD5 Collisions For Malware Detection
sheep-wolf is a tool to help you Exploit MD5 Collisions in software, specially malware samples which are commonly detected using MD5 hash signatures. and then a malicious one (Wolf) that have the same...
View ArticleCrowdRE – Crowdsourced Reverse Engineering Service From CrowdStrike
Views: 4,095 Reversing complex software quickly is challenging due to the lack of professional tools that support collaborative analysis. The CrowdRE project aims to fill this gap. Rather than using a...
View ArticleHook Analyser 3.1 – Malware Analysis Tool
Views: 5,514 Hook Analyser is a freeware application which allows an investigator/analyst to perform “static & run-time / dynamic” analysis of suspicious applications, also gather (analyse &...
View ArticleFakeNet – Windows Network Simulation Tool For Malware Analysis
Views: 7,783 FakeNet is a Windows Network Simulation Tool that aids in the dynamic analysis of malicious software. The tool simulates a network so that malware interacting with a remote host continues...
View ArticleSantoku Linux – Mobile Forensics, Malware Analysis, and App Security Testing...
Views: 6,386 The word santoku loosely translates as ‘three virtues’ or ‘three uses’. Santoku Linux has been crafted with a plethora of open source tools to support you in three endeavours, mobile...
View ArticleMalheur – Automatic Malware Analysis Tool
Views: 39,786 Malheur is a automatic malware analysis tool for the automatic analysis of malware behaviour (program behaviour recorded from malicious software in a sandbox environment). It has been...
View ArticleYARA – Pattern Matching Tool For Malware Analysis
Views: 5,253 YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever...
View ArticlePEiD Download – Detect PE Packers, Cryptors & Compilers
Views: 15,773 PEiD is an intuitive application that relies on its user-friendly interface to detect PE packers, cryptors and compilers found in executable files – its detection rate is higher than that...
View ArticleCuckoo Sandbox – Automated Malware Analysis System
Views: 6,675 Cuckoo Sandbox is Open Source software for automating analysis of suspicious files. To do so it makes use of custom components that monitor the behaviour of the malicious processes while...
View ArticlePowerShellArsenal – PowerShell For Reverse Engineering
Views: 5,171 PowerShellArsenal is basically PowerShell for reverse engineering in a module format. The module can be used to disassemble managed and unmanaged code, perform .NET malware analysis,...
View Article
More Pages to Explore .....