| # Awesome Malware Analysis [](https://github.com/sindresorhus/awesome) | |
| A curated list of awesome malware analysis tools and resources. Inspired by | |
| [awesome-python](https://github.com/vinta/awesome-python) and | |
| [awesome-php](https://github.com/ziadoz/awesome-php). | |
| [](https://twitter.com/githubbers/status/1182017616740663296) | |
| - [Malware Collection](#malware-collection) | |
| - [Anonymizers](#anonymizers) | |
| - [Honeypots](#honeypots) | |
| - [Malware Corpora](#malware-corpora) | |
| - [Open Source Threat Intelligence](#open-source-threat-intelligence) | |
| - [Tools](#tools) | |
| - [Other Resources](#other-resources) | |
| - [Detection and Classification](#detection-and-classification) | |
| - [Online Scanners and Sandboxes](#online-scanners-and-sandboxes) | |
| - [Domain Analysis](#domain-analysis) | |
| - [Browser Malware](#browser-malware) | |
| - [Documents and Shellcode](#documents-and-shellcode) | |
| - [File Carving](#file-carving) | |
| - [Deobfuscation](#deobfuscation) | |
| - [Debugging and Reverse Engineering](#debugging-and-reverse-engineering) | |
| - [Network](#network) | |
| - [Memory Forensics](#memory-forensics) | |
| - [Windows Artifacts](#windows-artifacts) | |
| - [Storage and Workflow](#storage-and-workflow) | |
| - [Miscellaneous](#miscellaneous) | |
| - [Resources](#resources) | |
| - [Books](#books) | |
| - [Other](#other) | |
| - [Related Awesome Lists](#related-awesome-lists) | |
| - [Contributing](#contributing) | |
| - [Thanks](#thanks) | |
| View Chinese translation: [恶意软件分析大合集.md](恶意软件分析大合集.md). | |
| --- | |
| ## Malware Collection | |
| ### Anonymizers | |
| *Web traffic anonymizers for analysts.* | |
| * [Anonymouse.org](http://anonymouse.org/) - A free, web based anonymizer. | |
| * [OpenVPN](https://openvpn.net/) - VPN software and hosting solutions. | |
| * [Privoxy](http://www.privoxy.org/) - An open source proxy server with some | |
| privacy features. | |
| * [Tor](https://www.torproject.org/) - The Onion Router, for browsing the web | |
| without leaving traces of the client IP. | |
| ### Honeypots | |
| *Trap and collect your own samples.* | |
| * [Conpot](https://github.com/mushorg/conpot) - ICS/SCADA honeypot. | |
| * [Cowrie](https://github.com/micheloosterhof/cowrie) - SSH honeypot, based | |
| on Kippo. | |
| * [DemoHunter](https://github.com/RevengeComing/DemonHunter) - Low interaction Distributed Honeypots. | |
| * [Dionaea](https://github.com/DinoTools/dionaea) - Honeypot designed to trap malware. | |
| * [Glastopf](https://github.com/mushorg/glastopf) - Web application honeypot. | |
| * [Honeyd](http://www.honeyd.org/) - Create a virtual honeynet. | |
| * [HoneyDrive](https://bruteforce.gr/honeydrive/) - Honeypot bundle Linux distro. | |
| * [Honeytrap](https://github.com/honeytrap/honeytrap) - Opensource system for running, monitoring and managing honeypots. | |
| * [MHN](https://github.com/pwnlandia/mhn) - MHN is a centralized server for management and data collection of honeypots. MHN allows you to deploy sensors quickly and to collect data immediately, viewable from a neat web interface. | |
| * [Mnemosyne](https://github.com/johnnykv/mnemosyne) - A normalizer for | |
| honeypot data; supports Dionaea. | |
| * [Thug](https://github.com/buffer/thug) - Low interaction honeyclient, for | |
| investigating malicious websites. | |
| ### Malware Corpora | |
| *Malware samples collected for analysis.* | |
| * [Clean MX](http://support.clean-mx.com/clean-mx/viruses.php) - Realtime | |
| database of malware and malicious domains. | |
| * [Contagio](http://contagiodump.blogspot.com/) - A collection of recent | |
| malware samples and analyses. | |
| * [Exploit Database](https://www.exploit-db.com/) - Exploit and shellcode | |
| samples. | |
| * [Infosec - CERT-PA](https://infosec.cert-pa.it/analyze/submission.html) - Malware samples collection and analysis. | |
| * [InQuest Labs](https://labs.inquest.net) - Evergrowing searchable corpus of malicious Microsoft documents. | |
| * [Javascript Mallware Collection](https://github.com/HynekPetrak/javascript-malware-collection) - Collection of almost 40.000 javascript malware samples | |
| * [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - A resource providing | |
| rapid identification and actionable context for malware investigations. | |
| * [Malshare](https://malshare.com) - Large repository of malware actively | |
| scrapped from malicious sites. | |
| * [Ragpicker](https://github.com/robbyFux/Ragpicker) - Plugin based malware | |
| crawler with pre-analysis and reporting functionalities | |
| * [theZoo](https://github.com/ytisf/theZoo) - Live malware samples for | |
| analysts. | |
| * [Tracker h3x](http://tracker.h3x.eu/) - Agregator for malware corpus tracker | |
| and malicious download sites. | |
| * [vduddu malware repo](https://github.com/vduddu/Malware) - Collection of | |
| various malware files and source code. | |
| * [VirusBay](https://beta.virusbay.io/) - Community-Based malware repository and social network. | |
| * [ViruSign](http://www.virussign.com/) - Malware database that detected by | |
| many anti malware programs except ClamAV. | |
| * [VirusShare](https://virusshare.com/) - Malware repository, registration | |
| required. | |
| * [VX Vault](http://vxvault.net) - Active collection of malware samples. | |
| * [Zeltser's Sources](https://zeltser.com/malware-sample-sources/) - A list | |
| of malware sample sources put together by Lenny Zeltser. | |
| * [Zeus Source Code](https://github.com/Visgean/Zeus) - Source for the Zeus | |
| trojan leaked in 2011. | |
| * [VX Underground](http://vx-underground.org/) - Massive and growing collection of free malware samples. | |
| ## Open Source Threat Intelligence | |
| ### Tools | |
| *Harvest and analyze IOCs.* | |
| * [AbuseHelper](https://github.com/abusesa/abusehelper) - An open-source | |
| framework for receiving and redistributing abuse feeds and threat intel. | |
| * [AlienVault Open Threat Exchange](https://otx.alienvault.com/) - Share and | |
| collaborate in developing Threat Intelligence. | |
| * [Combine](https://github.com/mlsecproject/combine) - Tool to gather Threat | |
| Intelligence indicators from publicly available sources. | |
| * [Fileintel](https://github.com/keithjjones/fileintel) - Pull intelligence per file hash. | |
| * [Hostintel](https://github.com/keithjjones/hostintel) - Pull intelligence per host. | |
| * [IntelMQ](https://www.enisa.europa.eu/topics/csirt-cert-services/community-projects/incident-handling-automation) - | |
| A tool for CERTs for processing incident data using a message queue. | |
| * [IOC Editor](https://www.fireeye.com/services/freeware/ioc-editor.html) - | |
| A free editor for XML IOC files. | |
| * [iocextract](https://github.com/InQuest/python-iocextract) - Advanced Indicator | |
| of Compromise (IOC) extractor, Python library and command-line tool. | |
| * [ioc_writer](https://github.com/mandiant/ioc_writer) - Python library for | |
| working with OpenIOC objects, from Mandiant. | |
| * [MalPipe](https://github.com/silascutler/MalPipe) - Malware/IOC ingestion and | |
| processing engine, that enriches collected data. | |
| * [Massive Octo Spice](https://github.com/csirtgadgets/massive-octo-spice) - | |
| Previously known as CIF (Collective Intelligence Framework). Aggregates IOCs | |
| from various lists. Curated by the | |
| [CSIRT Gadgets Foundation](http://csirtgadgets.org/collective-intelligence-framework). | |
| * [MISP](https://github.com/MISP/MISP) - Malware Information Sharing | |
| Platform curated by [The MISP Project](http://www.misp-project.org/). | |
| * [Pulsedive](https://pulsedive.com) - Free, community-driven threat intelligence platform collecting IOCs from open-source feeds. | |
| * [PyIOCe](https://github.com/pidydx/PyIOCe) - A Python OpenIOC editor. | |
| * [RiskIQ](https://community.riskiq.com/) - Research, connect, tag and | |
| share IPs and domains. (Was PassiveTotal.) | |
| * [threataggregator](https://github.com/jpsenior/threataggregator) - | |
| Aggregates security threats from a number of sources, including some of | |
| those listed below in [other resources](#other-resources). | |
| * [ThreatConnect](https://threatconnect.com/free/) - TC Open allows you to see and | |
| share open source threat data, with support and validation from our free community. | |
| * [ThreatCrowd](https://www.threatcrowd.org/) - A search engine for threats, | |
| with graphical visualization. | |
| * [ThreatIngestor](https://github.com/InQuest/ThreatIngestor/) - Build | |
| automated threat intel pipelines sourcing from Twitter, RSS, GitHub, and | |
| more. | |
| * [ThreatTracker](https://github.com/michael-yip/ThreatTracker) - A Python | |
| script to monitor and generate alerts based on IOCs indexed by a set of | |
| Google Custom Search Engines. | |
| * [TIQ-test](https://github.com/mlsecproject/tiq-test) - Data visualization | |
| and statistical analysis of Threat Intelligence feeds. | |
| ### Other Resources | |
| *Threat intelligence and IOC resources.* | |
| * [Autoshun](https://www.autoshun.org/) ([list](https://www.autoshun.org/files/shunlist.csv)) - | |
| Snort plugin and blocklist. | |
| * [Bambenek Consulting Feeds](http://osint.bambenekconsulting.com/feeds/) - | |
| OSINT feeds based on malicious DGA algorithms. | |
| * [Fidelis Barncat](https://www.fidelissecurity.com/resources/fidelis-barncat) - | |
| Extensive malware config database (must request access). | |
| * [CI Army](http://cinsscore.com/) ([list](http://cinsscore.com/list/ci-badguys.txt)) - | |
| Network security blocklists. | |
| * [Critical Stack- Free Intel Market](https://intel.criticalstack.com) - Free | |
| intel aggregator with deduplication featuring 90+ feeds and over 1.2M indicators. | |
| * [Cybercrime tracker](http://cybercrime-tracker.net/) - Multiple botnet active tracker. | |
| * [FireEye IOCs](https://github.com/fireeye/iocs) - Indicators of Compromise | |
| shared publicly by FireEye. | |
| * [FireHOL IP Lists](https://iplists.firehol.org/) - Analytics for 350+ IP lists | |
| with a focus on attacks, malware and abuse. Evolution, Changes History, | |
| Country Maps, Age of IPs listed, Retention Policy, Overlaps. | |
| * [HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation. | |
| * [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol. | |
| * [Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service. | |
| * [InQuest REPdb](https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources. | |
| * [InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter. | |
| * [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and | |
| searchable incident database, with a web [API](https://dshield.org/api/). | |
| ([unofficial Python library](https://github.com/rshipp/python-dshield)). | |
| * [malc0de](http://malc0de.com/database/) - Searchable incident database. | |
| * [Malware Domain List](http://www.malwaredomainlist.com/) - Search and share | |
| malicious URLs. | |
| * [MetaDefender Threat Intelligence Feed](https://www.opswat.com/developers/threat-intelligence-feed) - | |
| List of the most looked up file hashes from MetaDefender Cloud. | |
| * [OpenIOC](https://www.fireeye.com/services/freeware.html) - Framework for sharing threat intelligence. | |
| * [Proofpoint Threat Intelligence](https://www.proofpoint.com/us/products/et-intelligence) - | |
| Rulesets and more. (Formerly Emerging Threats.) | |
| * [Ransomware overview](https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml) - | |
| A list of ransomware overview with details, detection and prevention. | |
| * [STIX - Structured Threat Information eXpression](http://stixproject.github.io) - | |
| Standardized language to represent and share cyber threat information. | |
| Related efforts from [MITRE](https://www.mitre.org/): | |
| - [CAPEC - Common Attack Pattern Enumeration and Classification](http://capec.mitre.org/) | |
| - [CybOX - Cyber Observables eXpression](http://cyboxproject.github.io) | |
| - [MAEC - Malware Attribute Enumeration and Characterization](http://maec.mitre.org/) | |
| - [TAXII - Trusted Automated eXchange of Indicator Information](http://taxiiproject.github.io) | |
| * [SystemLookup](https://www.systemlookup.com/) - SystemLookup hosts a collection of lists that provide information on | |
| the components of legitimate and potentially unwanted programs. | |
| * [ThreatMiner](https://www.threatminer.org/) - Data mining portal for threat | |
| intelligence, with search. | |
| * [threatRECON](https://threatrecon.co/) - Search for indicators, up to 1000 | |
| free per month. | |
| * [ThreatShare](https://threatshare.io/) - C2 panel tracker | |
| * [Yara rules](https://github.com/Yara-Rules/rules) - Yara rules repository. | |
| * [YETI](https://github.com/yeti-platform/yeti) - Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. | |
| * [ZeuS Tracker](https://zeustracker.abuse.ch/blocklist.php) - ZeuS | |
| blocklists. | |
| ## Detection and Classification | |
| *Antivirus and other malware identification tools* | |
| * [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Wrapper for a | |
| variety of tools for reporting on Windows PE files. | |
| * [Assemblyline](https://cybercentrecanada.github.io/assemblyline4_docs/) - A scalable file triage and malware analysis system integrating the cyber security community's best tools.. | |
| * [BinaryAlert](https://github.com/airbnb/binaryalert) - An open source, serverless | |
| AWS pipeline that scans and alerts on uploaded files based on a set of | |
| YARA rules. | |
| * [capa](https://github.com/fireeye/capa) - Detects capabilities in executable files. | |
| * [chkrootkit](http://www.chkrootkit.org/) - Local Linux rootkit detection. | |
| * [ClamAV](http://www.clamav.net/) - Open source antivirus engine. | |
| * [Detect It Easy(DiE)](https://github.com/horsicq/Detect-It-Easy) - A program for | |
| determining types of files. | |
| * [Exeinfo PE](http://exeinfo.pe.hu/) - Packer, compressor detector, unpack | |
| info, internal exe tools. | |
| * [ExifTool](https://sno.phy.queensu.ca/~phil/exiftool/) - Read, write and | |
| edit file metadata. | |
| * [File Scanning Framework](https://github.com/EmersonElectricCo/fsf) - | |
| Modular, recursive file scanning solution. | |
| * [fn2yara](https://github.com/cmu-sei/pharos) - FN2Yara is a tool to generate | |
| Yara signatures for matching functions (code) in an executable program. | |
| * [Generic File Parser](https://github.com/uppusaikiran/generic-parser) - A Single Library Parser to extract meta information,static analysis and detect macros within the files. | |
| * [hashdeep](https://github.com/jessek/hashdeep) - Compute digest hashes with | |
| a variety of algorithms. | |
| * [HashCheck](https://github.com/gurnec/HashCheck) - Windows shell extension | |
| to compute hashes with a variety of algorithms. | |
| * [Loki](https://github.com/Neo23x0/Loki) - Host based scanner for IOCs. | |
| * [Malfunction](https://github.com/Dynetics/Malfunction) - Catalog and | |
| compare malware at a function level. | |
| * [Manalyze](https://github.com/JusticeRage/Manalyze) - Static analyzer for PE | |
| executables. | |
| * [MASTIFF](https://github.com/KoreLogicSecurity/mastiff) - Static analysis | |
| framework. | |
| * [MultiScanner](https://github.com/mitre/multiscanner) - Modular file | |
| scanning/analysis framework | |
| * [Nauz File Detector(NFD)](https://github.com/horsicq/Nauz-File-Detector) - Linker/Compiler/Tool detector for Windows, Linux and MacOS. | |
| * [nsrllookup](https://github.com/rjhansen/nsrllookup) - A tool for looking | |
| up hashes in NIST's National Software Reference Library database. | |
| * [packerid](https://github.com/sooshie/packerid) - A cross-platform | |
| Python alternative to PEiD. | |
| * [PE-bear](https://hshrzd.wordpress.com/pe-bear/) - Reversing tool for PE | |
| files. | |
| * [PEframe](https://github.com/guelfoweb/peframe) - PEframe is an open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents. | |
| * [PEV](http://pev.sourceforge.net/) - A multiplatform toolkit to work with PE | |
| files, providing feature-rich tools for proper analysis of suspicious binaries. | |
| * [PortEx](https://github.com/katjahahn/PortEx) - Java library to analyse PE files with a special focus on malware analysis and PE malformation robustness. | |
| * [Quark-Engine](https://github.com/quark-engine/quark-engine) - An Obfuscation-Neglect Android Malware Scoring System | |
| * [Rootkit Hunter](http://rkhunter.sourceforge.net/) - Detect Linux rootkits. | |
| * [ssdeep](https://ssdeep-project.github.io/ssdeep/) - Compute fuzzy hashes. | |
| * [totalhash.py](https://gist.github.com/gleblanc1783/3c8e6b379fa9d646d401b96ab5c7877f) - | |
| Python script for easy searching of the [TotalHash.cymru.com](https://totalhash.cymru.com/) | |
| database. | |
| * [TrID](http://mark0.net/soft-trid-e.html) - File identifier. | |
| * [YARA](https://plusvic.github.io/yara/) - Pattern matching tool for | |
| analysts. | |
| * [Yara rules generator](https://github.com/Neo23x0/yarGen) - Generate | |
| yara rules based on a set of malware samples. Also contains a good | |
| strings DB to avoid false positives. | |
| * [Yara Finder](https://github.com/uppusaikiran/yara-finder) - A simple tool to yara match the file against various yara rules to find the indicators of suspicion. | |
| ## Online Scanners and Sandboxes | |
| *Web-based multi-AV scanners, and malware sandboxes for automated analysis.* | |
| * [anlyz.io](https://sandbox.anlyz.io/) - Online sandbox. | |
| * [any.run](https://app.any.run/) - Online interactive sandbox. | |
| * [AndroTotal](https://andrototal.org/) - Free online analysis of APKs | |
| against multiple mobile antivirus apps. | |
| * [BoomBox](https://github.com/nbeede/BoomBox) - Automatic deployment of Cuckoo | |
| Sandbox malware lab using Packer and Vagrant. | |
| * [Cryptam](http://www.cryptam.com/) - Analyze suspicious office documents. | |
| * [Cuckoo Sandbox](https://cuckoosandbox.org/) - Open source, self hosted | |
| sandbox and automated analysis system. | |
| * [cuckoo-modified](https://github.com/brad-accuvant/cuckoo-modified) - Modified | |
| version of Cuckoo Sandbox released under the GPL. Not merged upstream due to | |
| legal concerns by the author. | |
| * [cuckoo-modified-api](https://github.com/keithjjones/cuckoo-modified-api) - A | |
| Python API used to control a cuckoo-modified sandbox. | |
| * [DeepViz](https://www.deepviz.com/) - Multi-format file analyzer with | |
| machine-learning classification. | |
| * [detux](https://github.com/detuxsandbox/detux/) - A sandbox developed to do | |
| traffic analysis of Linux malwares and capturing IOCs. | |
| * [DRAKVUF](https://github.com/tklengyel/drakvuf) - Dynamic malware analysis | |
| system. | |
| * [filescan.io](https://www.filescan.io/) - Static malware analysis, VBA/Powershell/VBS/JS Emulation | |
| * [firmware.re](http://firmware.re/) - Unpacks, scans and analyzes almost any | |
| firmware package. | |
| * [HaboMalHunter](https://github.com/Tencent/HaboMalHunter) - An Automated Malware | |
| Analysis Tool for Linux ELF Files. | |
| * [Hybrid Analysis](https://www.hybrid-analysis.com/) - Online malware | |
| analysis tool, powered by VxSandbox. | |
| * [Intezer](https://analyze.intezer.com) - Detect, analyze, and categorize malware by | |
| identifying code reuse and code similarities. | |
| * [IRMA](http://irma.quarkslab.com/) - An asynchronous and customizable | |
| analysis platform for suspicious files. | |
| * [Joe Sandbox](https://www.joesecurity.org) - Deep malware analysis with Joe Sandbox. | |
| * [Jotti](https://virusscan.jotti.org/en) - Free online multi-AV scanner. | |
| * [Limon](https://github.com/monnappa22/Limon) - Sandbox for Analyzing Linux Malware. | |
| * [Malheur](https://github.com/rieck/malheur) - Automatic sandboxed analysis | |
| of malware behavior. | |
| * [malice.io](https://github.com/maliceio/malice) - Massively scalable malware analysis framework. | |
| * [malsub](https://github.com/diogo-fernan/malsub) - A Python RESTful API framework for | |
| online malware and URL analysis services. | |
| * [Malware config](https://malwareconfig.com/) - Extract, decode and display online | |
| the configuration settings from common malwares. | |
| * [MalwareAnalyser.io](https://malwareanalyser.io/) - Online malware anomaly-based static analyser with heuristic detection engine powered by data mining and machine learning. | |
| * [Malwr](https://malwr.com/) - Free analysis with an online Cuckoo Sandbox | |
| instance. | |
| * [MetaDefender Cloud](https://metadefender.opswat.com/ ) - Scan a file, hash, IP, URL or | |
| domain address for malware for free. | |
| * [NetworkTotal](https://www.networktotal.com/index.html) - A service that analyzes | |
| pcap files and facilitates the quick detection of viruses, worms, trojans, and all | |
| kinds of malware using Suricata configured with EmergingThreats Pro. | |
| * [Noriben](https://github.com/Rurik/Noriben) - Uses Sysinternals Procmon to | |
| collect information about malware in a sandboxed environment. | |
| * [PacketTotal](https://packettotal.com/) - PacketTotal is an online engine for analyzing .pcap files, and visualizing the network traffic within. | |
| * [PDF Examiner](http://www.pdfexaminer.com/) - Analyse suspicious PDF files. | |
| * [ProcDot](http://www.procdot.com) - A graphical malware analysis tool kit. | |
| * [Recomposer](https://github.com/secretsquirrel/recomposer) - A helper | |
| script for safely uploading binaries to sandbox sites. | |
| * [sandboxapi](https://github.com/InQuest/python-sandboxapi) - Python library for | |
| building integrations with several open source and commercial malware sandboxes. | |
| * [SEE](https://github.com/F-Secure/see) - Sandboxed Execution Environment (SEE) | |
| is a framework for building test automation in secured Environments. | |
| * [SEKOIA Dropper Analysis](https://malware.sekoia.fr/) - Online dropper analysis (Js, VBScript, Microsoft Office, PDF). | |
| * [VirusTotal](https://www.virustotal.com/) - Free online analysis of malware | |
| samples and URLs | |
| * [Visualize_Logs](https://github.com/keithjjones/visualize_logs) - Open source | |
| visualization library and command line tools for logs. (Cuckoo, Procmon, more | |
| to come...) | |
| * [Zeltser's List](https://zeltser.com/automated-malware-analysis/) - Free | |
| automated sandboxes and services, compiled by Lenny Zeltser. | |
| ## Domain Analysis | |
| *Inspect domains and IP addresses.* | |
| * [AbuseIPDB](https://www.abuseipdb.com/) - AbuseIPDB is a project dedicated | |
| to helping combat the spread of hackers, spammers, and abusive activity on the internet. | |
| * [badips.com](https://www.badips.com/) - Community based IP blacklist service. | |
| * [boomerang](https://github.com/EmersonElectricCo/boomerang) - A tool designed | |
| for consistent and safe capture of off network web resources. | |
| * [Cymon](https://cymon.io/) - Threat intelligence tracker, with IP/domain/hash | |
| search. | |
| * [Desenmascara.me](http://desenmascara.me) - One click tool to retrieve as | |
| much metadata as possible for a website and to assess its good standing. | |
| * [Dig](https://networking.ringofsaturn.com/) - Free online dig and other | |
| network tools. | |
| * [dnstwist](https://github.com/elceef/dnstwist) - Domain name permutation | |
| engine for detecting typo squatting, phishing and corporate espionage. | |
| * [IPinfo](https://github.com/hiddenillusion/IPinfo) - Gather information | |
| about an IP or domain by searching online resources. | |
| * [Machinae](https://github.com/hurricanelabs/machinae) - OSINT tool for | |
| gathering information about URLs, IPs, or hashes. Similar to Automator. | |
| * [mailchecker](https://github.com/FGRibreau/mailchecker) - Cross-language | |
| temporary email detection library. | |
| * [MaltegoVT](https://github.com/michael-yip/MaltegoVT) - Maltego transform | |
| for the VirusTotal API. Allows domain/IP research, and searching for file | |
| hashes and scan reports. | |
| * [Multi rbl](http://multirbl.valli.org/) - Multiple DNS blacklist and forward | |
| confirmed reverse DNS lookup over more than 300 RBLs. | |
| * [NormShield Services](https://services.normshield.com/) - Free API Services | |
| for detecting possible phishing domains, blacklisted ip addresses and breached | |
| accounts. | |
| * [PhishStats](https://phishstats.info/) - Phishing Statistics with search for | |
| IP, domain and website title | |
| * [Spyse](https://spyse.com/) - subdomains, whois, realted domains, DNS, hosts AS, SSL/TLS info, | |
| * [SecurityTrails](https://securitytrails.com/) - Historical and current WHOIS, | |
| historical and current DNS records, similar domains, certificate information | |
| and other domain and IP related API and tools. | |
| * [SpamCop](https://www.spamcop.net/bl.shtml) - IP based spam block list. | |
| * [SpamHaus](https://www.spamhaus.org/lookup/) - Block list based on | |
| domains and IPs. | |
| * [Sucuri SiteCheck](https://sitecheck.sucuri.net/) - Free Website Malware | |
| and Security Scanner. | |
| * [Talos Intelligence](https://talosintelligence.com/) - Search for IP, domain | |
| or network owner. (Previously SenderBase.) | |
| * [TekDefense Automater](http://www.tekdefense.com/automater/) - OSINT tool | |
| for gathering information about URLs, IPs, or hashes. | |
| * [URLhaus](https://urlhaus.abuse.ch/) - A project from abuse.ch with the goal | |
| of sharing malicious URLs that are being used for malware distribution. | |
| * [URLQuery](http://urlquery.net/) - Free URL Scanner. | |
| * [urlscan.io](https://urlscan.io/) - Free URL Scanner & domain information. | |
| * [Whois](https://whois.domaintools.com/) - DomainTools free online whois | |
| search. | |
| * [Zeltser's List](https://zeltser.com/lookup-malicious-websites/) - Free | |
| online tools for researching malicious websites, compiled by Lenny Zeltser. | |
| * [ZScalar Zulu](https://zulu.zscaler.com/#) - Zulu URL Risk Analyzer. | |
| ## Browser Malware | |
| *Analyze malicious URLs. See also the [domain analysis](#domain-analysis) and | |
| [documents and shellcode](#documents-and-shellcode) sections.* | |
| * [Bytecode Viewer](https://github.com/Konloch/bytecode-viewer) - Combines | |
| multiple Java bytecode viewers and decompilers into one tool, including | |
| APK/DEX support. | |
| * [Firebug](https://getfirebug.com/) - Firefox extension for web development. | |
| * [Java Decompiler](http://jd.benow.ca/) - Decompile and inspect Java apps. | |
| * [Java IDX Parser](https://github.com/Rurik/Java_IDX_Parser/) - Parses Java | |
| IDX cache files. | |
| * [JSDetox](http://www.relentless-coding.com/projects/jsdetox/) - JavaScript | |
| malware analysis tool. | |
| * [jsunpack-n](https://github.com/urule99/jsunpack-n) - A javascript | |
| unpacker that emulates browser functionality. | |
| * [Krakatau](https://github.com/Storyyeller/Krakatau) - Java decompiler, | |
| assembler, and disassembler. | |
| * [Malzilla](http://malzilla.sourceforge.net/) - Analyze malicious web pages. | |
| * [RABCDAsm](https://github.com/CyberShadow/RABCDAsm) - A "Robust | |
| ActionScript Bytecode Disassembler." | |
| * [SWF Investigator](https://labs.adobe.com/technologies/swfinvestigator/) - | |
| Static and dynamic analysis of SWF applications. | |
| * [swftools](http://www.swftools.org/) - Tools for working with Adobe Flash | |
| files. | |
| * [xxxswf](http://hooked-on-mnemonics.blogspot.com/2011/12/xxxswfpy.html) - A | |
| Python script for analyzing Flash files. | |
| ## Documents and Shellcode | |
| *Analyze malicious JS and shellcode from PDFs and Office documents. See also | |
| the [browser malware](#browser-malware) section.* | |
| * [AnalyzePDF](https://github.com/hiddenillusion/AnalyzePDF) - A tool for | |
| analyzing PDFs and attempting to determine whether they are malicious. | |
| * [box-js](https://github.com/CapacitorSet/box-js) - A tool for studying JavaScript | |
| malware, featuring JScript/WScript support and ActiveX emulation. | |
| * [diStorm](http://www.ragestorm.net/distorm/) - Disassembler for analyzing | |
| malicious shellcode. | |
| * [InQuest Deep File Inspection](https://labs.inquest.net/dfi) - Upload common malware lures for Deep File Inspection and heuristical analysis. | |
| * [JS Beautifier](http://jsbeautifier.org/) - JavaScript unpacking and deobfuscation. | |
| * [libemu](http://libemu.carnivore.it/) - Library and tools for x86 shellcode | |
| emulation. | |
| * [malpdfobj](https://github.com/9b/malpdfobj) - Deconstruct malicious PDFs | |
| into a JSON representation. | |
| * [OfficeMalScanner](http://www.reconstructer.org/code.html) - Scan for | |
| malicious traces in MS Office documents. | |
| * [olevba](http://www.decalage.info/python/olevba) - A script for parsing OLE | |
| and OpenXML documents and extracting useful information. | |
| * [Origami PDF](https://code.google.com/archive/p/origami-pdf) - A tool for | |
| analyzing malicious PDFs, and more. | |
| * [PDF Tools](https://blog.didierstevens.com/programs/pdf-tools/) - pdfid, | |
| pdf-parser, and more from Didier Stevens. | |
| * [PDF X-Ray Lite](https://github.com/9b/pdfxray_lite) - A PDF analysis tool, | |
| the backend-free version of PDF X-RAY. | |
| * [peepdf](http://eternal-todo.com/tools/peepdf-pdf-analysis-tool) - Python | |
| tool for exploring possibly malicious PDFs. | |
| * [QuickSand](https://www.quicksand.io/) - QuickSand is a compact C framework | |
| to analyze suspected malware documents to identify exploits in streams of different | |
| encodings and to locate and extract embedded executables. | |
| * [Spidermonkey](https://developer.mozilla.org/en-US/docs/Mozilla/Projects/SpiderMonkey) - | |
| Mozilla's JavaScript engine, for debugging malicious JS. | |
| ## File Carving | |
| *For extracting files from inside disk and memory images.* | |
| * [bulk_extractor](https://github.com/simsong/bulk_extractor) - Fast file | |
| carving tool. | |
| * [EVTXtract](https://github.com/williballenthin/EVTXtract) - Carve Windows | |
| Event Log files from raw binary data. | |
| * [Foremost](http://foremost.sourceforge.net/) - File carving tool designed | |
| by the US Air Force. | |
| * [hachoir3](https://github.com/vstinner/hachoir3) - Hachoir is a Python library | |
| to view and edit a binary stream field by field. | |
| * [Scalpel](https://github.com/sleuthkit/scalpel) - Another data carving | |
| tool. | |
| * [SFlock](https://github.com/jbremer/sflock) - Nested archive | |
| extraction/unpacking (used in Cuckoo Sandbox). | |
| ## Deobfuscation | |
| *Reverse XOR and other code obfuscation methods.* | |
| * [Balbuzard](https://bitbucket.org/decalage/balbuzard/wiki/Home) - A malware | |
| analysis tool for reversing obfuscation (XOR, ROL, etc) and more. | |
| * [de4dot](https://github.com/0xd4d/de4dot) - .NET deobfuscator and | |
| unpacker. | |
| * [ex_pe_xor](http://hooked-on-mnemonics.blogspot.com/2014/04/expexorpy.html) | |
| & [iheartxor](http://hooked-on-mnemonics.blogspot.com/p/iheartxor.html) - | |
| Two tools from Alexander Hanel for working with single-byte XOR encoded | |
| files. | |
| * [FLOSS](https://github.com/fireeye/flare-floss) - The FireEye Labs Obfuscated | |
| String Solver uses advanced static analysis techniques to automatically | |
| deobfuscate strings from malware binaries. | |
| * [NoMoreXOR](https://github.com/hiddenillusion/NoMoreXOR) - Guess a 256 byte | |
| XOR key using frequency analysis. | |
| * [PackerAttacker](https://github.com/BromiumLabs/PackerAttacker) - A generic | |
| hidden code extractor for Windows malware. | |
| * [PyInstaller Extractor](https://github.com/extremecoders-re/pyinstxtractor) - | |
| A Python script to extract the contents of a PyInstaller generated Windows | |
| executable file. The contents of the pyz file (usually pyc files) present | |
| inside the executable are also extracted and automatically fixed so that a | |
| Python bytecode decompiler will recognize it. | |
| * [uncompyle6](https://github.com/rocky/python-uncompyle6/) - A cross-version | |
| Python bytecode decompiler. Translates Python bytecode back into equivalent | |
| Python source code. | |
| * [un{i}packer](https://github.com/unipacker/unipacker) - Automatic and | |
| platform-independent unpacker for Windows binaries based on emulation. | |
| * [unpacker](https://github.com/malwaremusings/unpacker/) - Automated malware | |
| unpacker for Windows malware based on WinAppDbg. | |
| * [unxor](https://github.com/tomchop/unxor/) - Guess XOR keys using | |
| known-plaintext attacks. | |
| * [VirtualDeobfuscator](https://github.com/jnraber/VirtualDeobfuscator) - | |
| Reverse engineering tool for virtualization wrappers. | |
| * [XORBruteForcer](http://eternal-todo.com/var/scripts/xorbruteforcer) - | |
| A Python script for brute forcing single-byte XOR keys. | |
| * [XORSearch & XORStrings](https://blog.didierstevens.com/programs/xorsearch/) - | |
| A couple programs from Didier Stevens for finding XORed data. | |
| * [xortool](https://github.com/hellman/xortool) - Guess XOR key length, as | |
| well as the key itself. | |
| ## Debugging and Reverse Engineering | |
| *Disassemblers, debuggers, and other static and dynamic analysis tools.* | |
| * [angr](https://github.com/angr/angr) - Platform-agnostic binary analysis | |
| framework developed at UCSB's Seclab. | |
| * [bamfdetect](https://github.com/bwall/bamfdetect) - Identifies and extracts | |
| information from bots and other malware. | |
| * [BAP](https://github.com/BinaryAnalysisPlatform/bap) - Multiplatform and | |
| open source (MIT) binary analysis framework developed at CMU's Cylab. | |
| * [BARF](https://github.com/programa-stic/barf-project) - Multiplatform, open | |
| source Binary Analysis and Reverse engineering Framework. | |
| * [binnavi](https://github.com/google/binnavi) - Binary analysis IDE for | |
| reverse engineering based on graph visualization. | |
| * [Binary ninja](https://binary.ninja/) - A reversing engineering platform | |
| that is an alternative to IDA. | |
| * [Binwalk](https://github.com/devttys0/binwalk) - Firmware analysis tool. | |
| * [BluePill](https://github.com/season-lab/bluepill) - Framework for executing and debugging evasive malware and protected executables. | |
| * [Capstone](https://github.com/aquynh/capstone) - Disassembly framework for | |
| binary analysis and reversing, with support for many architectures and | |
| bindings in several languages. | |
| * [codebro](https://github.com/hugsy/codebro) - Web based code browser using | |
| clang to provide basic code analysis. | |
| * [Cutter](https://github.com/radareorg/cutter) - GUI for Radare2. | |
| * [DECAF (Dynamic Executable Code Analysis Framework)](https://github.com/sycurelab/DECAF) | |
| - A binary analysis platform based on QEMU. DroidScope is now an extension to DECAF. | |
| * [dnSpy](https://github.com/0xd4d/dnSpy) - .NET assembly editor, decompiler | |
| and debugger. | |
| * [dotPeek](https://www.jetbrains.com/decompiler/) - Free .NET Decompiler and | |
| Assembly Browser. | |
| * [Evan's Debugger (EDB)](http://codef00.com/projects#debugger) - A | |
| modular debugger with a Qt GUI. | |
| * [Fibratus](https://github.com/rabbitstack/fibratus) - Tool for exploration | |
| and tracing of the Windows kernel. | |
| * [FPort](https://www.mcafee.com/us/downloads/free-tools/fport.aspx) - Reports | |
| open TCP/IP and UDP ports in a live system and maps them to the owning application. | |
| * [GDB](http://www.sourceware.org/gdb/) - The GNU debugger. | |
| * [GEF](https://github.com/hugsy/gef) - GDB Enhanced Features, for exploiters | |
| and reverse engineers. | |
| * [Ghidra](https://github.com/NationalSecurityAgency/ghidra) - A software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. | |
| * [hackers-grep](https://github.com/codypierce/hackers-grep) - A utility to | |
| search for strings in PE executables including imports, exports, and debug | |
| symbols. | |
| * [Hopper](https://www.hopperapp.com/) - The macOS and Linux Disassembler. | |
| * [IDA Pro](https://www.hex-rays.com/products/ida/index.shtml) - Windows | |
| disassembler and debugger, with a free evaluation version. | |
| * [IDR](https://github.com/crypto2011/IDR) - Interactive Delphi Reconstructor | |
| is a decompiler of Delphi executable files and dynamic libraries. | |
| * [Immunity Debugger](http://debugger.immunityinc.com/) - Debugger for | |
| malware analysis and more, with a Python API. | |
| * [ILSpy](http://ilspy.net/) - ILSpy is the open-source .NET assembly browser and decompiler. | |
| * [Kaitai Struct](http://kaitai.io/) - DSL for file formats / network protocols / | |
| data structures reverse engineering and dissection, with code generation | |
| for C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby. | |
| * [LIEF](https://lief.quarkslab.com/) - LIEF provides a cross-platform library | |
| to parse, modify and abstract ELF, PE and MachO formats. | |
| * [ltrace](http://ltrace.org/) - Dynamic analysis for Linux executables. | |
| * [mac-a-mal](https://github.com/phdphuc/mac-a-mal) - An automated framework | |
| for mac malware hunting. | |
| * [objdump](https://en.wikipedia.org/wiki/Objdump) - Part of GNU binutils, | |
| for static analysis of Linux binaries. | |
| * [OllyDbg](http://www.ollydbg.de/) - An assembly-level debugger for Windows | |
| executables. | |
| * [OllyDumpEx](https://low-priority.appspot.com/ollydumpex/) - Dump memory | |
| from (unpacked) malware Windows process and store raw or rebuild PE file. | |
| This is a plugin for OllyDbg, Immunity Debugger, IDA Pro, WinDbg, and x64dbg. | |
| * [PANDA](https://github.com/moyix/panda) - Platform for Architecture-Neutral | |
| Dynamic Analysis. | |
| * [PEDA](https://github.com/longld/peda) - Python Exploit Development | |
| Assistance for GDB, an enhanced display with added commands. | |
| * [pestudio](https://winitor.com/) - Perform static analysis of Windows | |
| executables. | |
| * [Pharos](https://github.com/cmu-sei/pharos) - The Pharos binary analysis framework | |
| can be used to perform automated static analysis of binaries. | |
| * [plasma](https://github.com/plasma-disassembler/plasma) - Interactive | |
| disassembler for x86/ARM/MIPS. | |
| * [PPEE (puppy)](https://www.mzrst.com/) - A Professional PE file Explorer for | |
| reversers, malware researchers and those who want to statically inspect PE | |
| files in more detail. | |
| * [Process Explorer](https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer) - | |
| Advanced task manager for Windows. | |
| * [Process Hacker](http://processhacker.sourceforge.net/) - Tool that monitors | |
| system resources. | |
| * [Process Monitor](https://docs.microsoft.com/en-us/sysinternals/downloads/procmon) - | |
| Advanced monitoring tool for Windows programs. | |
| * [PSTools](https://docs.microsoft.com/en-us/sysinternals/downloads/pstools) - Windows | |
| command-line tools that help manage and investigate live systems. | |
| * [Pyew](https://github.com/joxeankoret/pyew) - Python tool for malware | |
| analysis. | |
| * [PyREBox](https://github.com/Cisco-Talos/pyrebox) - Python scriptable reverse | |
| engineering sandbox by the Talos team at Cisco. | |
| * [Qiling Framework](https://www.qiling.io/) - Cross platform emulation and sanboxing | |
| framework with instruments for binary analysis. | |
| * [QKD](https://github.com/ispras/qemu/releases/) - QEMU with embedded WinDbg | |
| server for stealth debugging. | |
| * [Radare2](http://www.radare.org/r/) - Reverse engineering framework, with | |
| debugger support. | |
| * [RegShot](https://sourceforge.net/projects/regshot/) - Registry compare utility | |
| that compares snapshots. | |
| * [RetDec](https://retdec.com/) - Retargetable machine-code decompiler with an | |
| [online decompilation service](https://retdec.com/decompilation/) and | |
| [API](https://retdec.com/api/) that you can use in your tools. | |
| * [ROPMEMU](https://github.com/Cisco-Talos/ROPMEMU) - A framework to analyze, dissect | |
| and decompile complex code-reuse attacks. | |
| * [Scylla Imports Reconstructor](https://github.com/NtQuery/Scylla) - Find and fix | |
| the IAT of an unpacked / dumped PE32 malware. | |
| * [ScyllaHide](https://github.com/x64dbg/ScyllaHide) - An Anti-Anti-Debug library | |
| and plugin for OllyDbg, x64dbg, IDA Pro, and TitanEngine. | |
| * [SMRT](https://github.com/pidydx/SMRT) - Sublime Malware Research Tool, a | |
| plugin for Sublime 3 to aid with malware analyis. | |
| * [strace](https://sourceforge.net/projects/strace/) - Dynamic analysis for | |
| Linux executables. | |
| * [StringSifter](https://github.com/fireeye/stringsifter) - A machine learning tool | |
| that automatically ranks strings based on their relevance for malware analysis. | |
| * [Triton](https://triton.quarkslab.com/) - A dynamic binary analysis (DBA) framework. | |
| * [Udis86](https://github.com/vmt/udis86) - Disassembler library and tool | |
| for x86 and x86_64. | |
| * [Vivisect](https://github.com/vivisect/vivisect) - Python tool for | |
| malware analysis. | |
| * [WinDbg](https://developer.microsoft.com/en-us/windows/hardware/download-windbg) - multipurpose debugger for the Microsoft Windows computer operating system, used to debug user mode applications, device drivers, and the kernel-mode memory dumps. | |
| * [X64dbg](https://github.com/x64dbg/) - An open-source x64/x32 debugger for windows. | |
| ## Network | |
| *Analyze network interactions.* | |
| * [Bro](https://www.bro.org) - Protocol analyzer that operates at incredible | |
| scale; both file and network protocols. | |
| * [BroYara](https://github.com/hempnall/broyara) - Use Yara rules from Bro. | |
| * [CapTipper](https://github.com/omriher/CapTipper) - Malicious HTTP traffic | |
| explorer. | |
| * [chopshop](https://github.com/MITRECND/chopshop) - Protocol analysis and | |
| decoding framework. | |
| * [CloudShark](https://www.cloudshark.org) - Web-based tool for packet analysis | |
| and malware traffic detection. | |
| * [FakeNet-NG](https://github.com/fireeye/flare-fakenet-ng) - Next generation | |
| dynamic network analysis tool. | |
| * [Fiddler](https://www.telerik.com/fiddler) - Intercepting web proxy designed | |
| for "web debugging." | |
| * [Hale](https://github.com/pjlantz/Hale) - Botnet C&C monitor. | |
| * [Haka](http://www.haka-security.org/) - An open source security oriented | |
| language for describing protocols and applying security policies on (live) | |
| captured traffic. | |
| * [HTTPReplay](https://github.com/jbremer/httpreplay) - Library for parsing | |
| and reading out PCAP files, including TLS streams using TLS Master Secrets | |
| (used in Cuckoo Sandbox). | |
| * [INetSim](http://www.inetsim.org/) - Network service emulation, useful when | |
| building a malware lab. | |
| * [Laika BOSS](https://github.com/lmco/laikaboss) - Laika BOSS is a file-centric | |
| malware analysis and intrusion detection system. | |
| * [Malcolm](https://github.com/idaholab/Malcolm) - Malcolm is a powerful, easily | |
| deployable network traffic analysis tool suite for full packet capture artifacts | |
| (PCAP files) and Zeek logs. | |
| * [Malcom](https://github.com/tomchop/malcom) - Malware Communications | |
| Analyzer. | |
| * [Maltrail](https://github.com/stamparm/maltrail) - A malicious traffic | |
| detection system, utilizing publicly available (black)lists containing | |
| malicious and/or generally suspicious trails and featuring an reporting | |
| and analysis interface. | |
| * [mitmproxy](https://mitmproxy.org/) - Intercept network traffic on the fly. | |
| * [Moloch](https://github.com/aol/moloch) - IPv4 traffic capturing, indexing | |
| and database system. | |
| * [NetworkMiner](http://www.netresec.com/?page=NetworkMiner) - Network | |
| forensic analysis tool, with a free version. | |
| * [ngrep](https://github.com/jpr5/ngrep) - Search through network traffic | |
| like grep. | |
| * [PcapViz](https://github.com/mateuszk87/PcapViz) - Network topology and | |
| traffic visualizer. | |
| * [Python ICAP Yara](https://github.com/RamadhanAmizudin/python-icap-yara) - An | |
| ICAP Server with yara scanner for URL or content. | |
| * [Squidmagic](https://github.com/ch3k1/squidmagic) - squidmagic is a tool | |
| designed to analyze a web-based network traffic to detect central command | |
| and control (C&C) servers and malicious sites, using Squid proxy server and | |
| Spamhaus. | |
| * [Tcpdump](http://www.tcpdump.org/) - Collect network traffic. | |
| * [tcpick](http://tcpick.sourceforge.net/) - Trach and reassemble TCP streams | |
| from network traffic. | |
| * [tcpxtract](http://tcpxtract.sourceforge.net/) - Extract files from network | |
| traffic. | |
| * [Wireshark](https://www.wireshark.org/) - The network traffic analysis | |
| tool. | |
| ## Memory Forensics | |
| *Tools for dissecting malware in memory images or running systems.* | |
| * [BlackLight](https://www.blackbagtech.com/blacklight.html) - Windows/MacOS | |
| forensics client supporting hiberfil, pagefile, raw memory analysis. | |
| * [DAMM](https://github.com/504ensicsLabs/DAMM) - Differential Analysis of | |
| Malware in Memory, built on Volatility. | |
| * [evolve](https://github.com/JamesHabben/evolve) - Web interface for the | |
| Volatility Memory Forensics Framework. | |
| * [FindAES](https://sourceforge.net/projects/findaes/) - Find AES | |
| encryption keys in memory. | |
| * [inVtero.net](https://github.com/ShaneK2/inVtero.net) - High speed memory | |
| analysis framework developed in .NET supports all Windows x64, includes | |
| code integrity and write support. | |
| * [Muninn](https://github.com/ytisf/muninn) - A script to automate portions | |
| of analysis using Volatility, and create a readable report. | |
| [Orochi](https://github.com/LDO-CERT/orochi) - Orochi is an open source framework for | |
| collaborative forensic memory dump analysis. | |
| * [Rekall](http://www.rekall-forensic.com/) - Memory analysis framework, | |
| forked from Volatility in 2013. | |
| * [TotalRecall](https://github.com/sketchymoose/TotalRecall) - Script based | |
| on Volatility for automating various malware analysis tasks. | |
| * [VolDiff](https://github.com/aim4r/VolDiff) - Run Volatility on memory | |
| images before and after malware execution, and report changes. | |
| * [Volatility](https://github.com/volatilityfoundation/volatility) - Advanced | |
| memory forensics framework. | |
| * [VolUtility](https://github.com/kevthehermit/VolUtility) - Web Interface for | |
| Volatility Memory Analysis framework. | |
| * [WDBGARK](https://github.com/swwwolf/wdbgark) - | |
| WinDBG Anti-RootKit Extension. | |
| * [WinDbg](https://developer.microsoft.com/en-us/windows/hardware/windows-driver-kit) - | |
| Live memory inspection and kernel debugging for Windows systems. | |
| ## Windows Artifacts | |
| * [AChoir](https://github.com/OMENScan/AChoir) - A live incident response | |
| script for gathering Windows artifacts. | |
| * [python-evt](https://github.com/williballenthin/python-evt) - Python | |
| library for parsing Windows Event Logs. | |
| * [python-registry](http://www.williballenthin.com/registry/) - Python | |
| library for parsing registry files. | |
| * [RegRipper](http://brettshavers.cc/index.php/brettsblog/tags/tag/regripper/) | |
| ([GitHub](https://github.com/keydet89/RegRipper2.8)) - | |
| Plugin-based registry analysis tool. | |
| ## Storage and Workflow | |
| * [Aleph](https://github.com/merces/aleph) - Open Source Malware Analysis | |
| Pipeline System. | |
| * [CRITs](https://crits.github.io/) - Collaborative Research Into Threats, a | |
| malware and threat repository. | |
| * [FAME](https://certsocietegenerale.github.io/fame/) - A malware analysis | |
| framework featuring a pipeline that can be extended with custom modules, | |
| which can be chained and interact with each other to perform end-to-end | |
| analysis. | |
| * [Malwarehouse](https://github.com/sroberts/malwarehouse) - Store, tag, and | |
| search malware. | |
| * [Polichombr](https://github.com/ANSSI-FR/polichombr) - A malware analysis | |
| platform designed to help analysts to reverse malwares collaboratively. | |
| * [stoQ](http://stoq.punchcyber.com) - Distributed content analysis | |
| framework with extensive plugin support, from input to output, and everything | |
| in between. | |
| * [Viper](http://viper.li/) - A binary management and analysis framework for | |
| analysts and researchers. | |
| ## Miscellaneous | |
| * [al-khaser](https://github.com/LordNoteworthy/al-khaser) - A PoC malware | |
| with good intentions that aimes to stress anti-malware systems. | |
| * [CryptoKnight](https://github.com/AbertayMachineLearningGroup/CryptoKnight) - Automated cryptographic algorithm reverse engineering and classification framework. | |
| * [DC3-MWCP](https://github.com/Defense-Cyber-Crime-Center/DC3-MWCP) - | |
| The Defense Cyber Crime Center's Malware Configuration Parser framework. | |
| * [FLARE VM](https://github.com/fireeye/flare-vm) - A fully customizable, | |
| Windows-based, security distribution for malware analysis. | |
| * [MalSploitBase](https://github.com/misterch0c/malSploitBase) - A database | |
| containing exploits used by malware. | |
| * [Malware Museum](https://archive.org/details/malwaremuseum) - Collection of | |
| malware programs that were distributed in the 1980s and 1990s. | |
| * [Malware Organiser](https://github.com/uppusaikiran/malware-organiser) - A simple tool to organise large malicious/benign files into a organised Structure. | |
| * [Pafish](https://github.com/a0rtega/pafish) - Paranoid Fish, a demonstration | |
| tool that employs several techniques to detect sandboxes and analysis | |
| environments in the same way as malware families do. | |
| * [REMnux](https://remnux.org/) - Linux distribution and docker images for | |
| malware reverse engineering and analysis. | |
| * [Tsurugi Linux](https://tsurugi-linux.org/) - Linux distribution designed to support your DFIR investigations, malware analysis and OSINT (Open Source INTelligence) activities. | |
| * [Santoku Linux](https://santoku-linux.com/) - Linux distribution for mobile | |
| forensics, malware analysis, and security. | |
| # Resources | |
| ## Books | |
| *Essential malware analysis reading material.* | |
| * [Learning Malware Analysis](https://www.packtpub.com/networking-and-servers/learning-malware-analysis) - Learning Malware Analysis: Explore the concepts, tools, and techniques to analuze and investigate Windows malware | |
| * [Malware Analyst's Cookbook and DVD](https://amzn.com/dp/0470613033) - | |
| Tools and Techniques for Fighting Malicious Code. | |
| * [Mastering Malware Analysis](https://www.packtpub.com/networking-and-servers/mastering-malware-analysis) - Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercime, and IoT attacks | |
| * [Mastering Reverse Engineering](https://www.packtpub.com/networking-and-servers/mastering-reverse-engineering) - Mastering Reverse Engineering: Re-engineer your ethical hacking skills | |
| * [Practical Malware Analysis](https://amzn.com/dp/1593272901) - The Hands-On | |
| Guide to Dissecting Malicious Software. | |
| * [Practical Reverse Engineering](https://www.amzn.com/dp/1118787315/) - | |
| Intermediate Reverse Engineering. | |
| * [Real Digital Forensics](https://www.amzn.com/dp/0321240693) - Computer | |
| Security and Incident Response. | |
| * [Rootkits and Bootkits](https://www.amazon.com/dp/1593277164) - Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats | |
| * [The Art of Memory Forensics](https://amzn.com/dp/1118825098) - Detecting | |
| Malware and Threats in Windows, Linux, and Mac Memory. | |
| * [The IDA Pro Book](https://amzn.com/dp/1593272898) - The Unofficial Guide | |
| to the World's Most Popular Disassembler. | |
| * [The Rootkit Arsenal](https://amzn.com/dp/144962636X) - The Rootkit Arsenal: | |
| Escape and Evasion in the Dark Corners of the System | |
| ## Other | |
| * [APT Notes](https://github.com/aptnotes/data) - A collection of papers | |
| and notes related to Advanced Persistent Threats. | |
| * [Ember](https://github.com/endgameinc/ember) - Endgame Malware BEnchmark for Research, | |
| a repository that makes it easy to (re)create a machine learning model that can be used | |
| to predict a score for a PE file based on static analysis. | |
| * [File Formats posters](https://github.com/corkami/pics) - Nice visualization | |
| of commonly used file format (including PE & ELF). | |
| * [Honeynet Project](http://honeynet.org/) - Honeypot tools, papers, and | |
| other resources. | |
| * [Kernel Mode](http://www.kernelmode.info/forum/) - An active community | |
| devoted to malware analysis and kernel development. | |
| * [Malicious Software](https://zeltser.com/malicious-software/) - Malware | |
| blog and resources by Lenny Zeltser. | |
| * [Malware Analysis Search](https://cse.google.com/cse/home?cx=011750002002865445766%3Apc60zx1rliu) - | |
| Custom Google search engine from [Corey Harrell](journeyintoir.blogspot.com/). | |
| * [Malware Analysis Tutorials](http://fumalwareanalysis.blogspot.nl/p/malware-analysis-tutorials-reverse.html) - | |
| The Malware Analysis Tutorials by Dr. Xiang Fu, a great resource for learning | |
| practical malware analysis. | |
| * [Malware Analysis, Threat Intelligence and Reverse Engineering](https://www.slideshare.net/bartblaze/malware-analysis-threat-intelligence-and-reverse-engineering) - | |
| Presentation introducing the concepts of malware analysis, threat intelligence | |
| and reverse engineering. Experience or prior knowledge is not required. Labs | |
| link in description. | |
| * [Malware Persistence](https://github.com/Karneades/malware-persistence) - Collection | |
| of various information focused on malware persistence: detection (techniques), | |
| response, pitfalls and the log collection (tools). | |
| * [Malware Samples and Traffic](http://malware-traffic-analysis.net/) - This | |
| blog focuses on network traffic related to malware infections. | |
| * [Malware Search+++](https://addons.mozilla.org/fr/firefox/addon/malware-search-plusplusplus/) Firefox extension allows | |
| you to easily search some of the most popular malware databases | |
| * [Practical Malware Analysis Starter Kit](https://bluesoul.me/practical-malware-analysis-starter-kit/) - | |
| This package contains most of the software referenced in the Practical Malware | |
| Analysis book. | |
| * [RPISEC Malware Analysis](https://github.com/RPISEC/Malware) - These are the | |
| course materials used in the Malware Analysis course at at Rensselaer Polytechnic | |
| Institute during Fall 2015. | |
| * [WindowsIR: Malware](http://windowsir.blogspot.com/p/malware.html) - Harlan | |
| Carvey's page on Malware. | |
| * [Windows Registry specification](https://github.com/msuhanov/regf/blob/master/Windows%20registry%20file%20format%20specification.md) - | |
| Windows registry file format specification. | |
| * [/r/csirt_tools](https://www.reddit.com/r/csirt_tools/) - Subreddit for CSIRT | |
| tools and resources, with a | |
| [malware analysis](https://www.reddit.com/r/csirt_tools/search?q=flair%3A%22Malware%20analysis%22&sort=new&restrict_sr=on) flair. | |
| * [/r/Malware](https://www.reddit.com/r/Malware) - The malware subreddit. | |
| * [/r/ReverseEngineering](https://www.reddit.com/r/ReverseEngineering) - | |
| Reverse engineering subreddit, not limited to just malware. | |
| # Related Awesome Lists | |
| * [Android Security](https://github.com/ashishb/android-security-awesome) | |
| * [AppSec](https://github.com/paragonie/awesome-appsec) | |
| * [CTFs](https://github.com/apsdehal/awesome-ctf) | |
| * [Executable Packing](https://github.com/dhondta/awesome-executable-packing) | |
| * [Forensics](https://github.com/Cugu/awesome-forensics) | |
| * ["Hacking"](https://github.com/carpedm20/awesome-hacking) | |
| * [Honeypots](https://github.com/paralax/awesome-honeypots) | |
| * [Industrial Control System Security](https://github.com/hslatman/awesome-industrial-control-system-security) | |
| * [Incident-Response](https://github.com/meirwah/awesome-incident-response) | |
| * [Infosec](https://github.com/onlurking/awesome-infosec) | |
| * [PCAP Tools](https://github.com/caesar0301/awesome-pcaptools) | |
| * [Pentesting](https://github.com/enaqx/awesome-pentest) | |
| * [Security](https://github.com/sbilly/awesome-security) | |
| * [Threat Intelligence](https://github.com/hslatman/awesome-threat-intelligence) | |
| * [YARA](https://github.com/InQuest/awesome-yara) | |
| # [Contributing](CONTRIBUTING.md) | |
| Pull requests and issues with suggestions are welcome! Please read the | |
| [CONTRIBUTING](CONTRIBUTING.md) guidelines before submitting a PR. | |
| # Thanks | |
| This list was made possible by: | |
| * Lenny Zeltser and other contributors for developing REMnux, where I | |
| found many of the tools in this list; | |
| * Michail Hale Ligh, Steven Adair, Blake Hartstein, and Mather Richard for | |
| writing the *Malware Analyst's Cookbook*, which was a big inspiration for | |
| creating the list; | |
| * And everyone else who has sent pull requests or suggested links to add here! | |
| Thanks! | |