Che237 commited on
Commit
0e2826a
·
verified ·
1 Parent(s): e49ba7b

Upload malware_detection dataset

Browse files
malware_detection/malware_detection_data ADDED
@@ -0,0 +1,911 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Awesome Malware Analysis [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
2
+
3
+ A curated list of awesome malware analysis tools and resources. Inspired by
4
+ [awesome-python](https://github.com/vinta/awesome-python) and
5
+ [awesome-php](https://github.com/ziadoz/awesome-php).
6
+
7
+ [![Drop ICE](drop.png)](https://twitter.com/githubbers/status/1182017616740663296)
8
+
9
+ - [Malware Collection](#malware-collection)
10
+ - [Anonymizers](#anonymizers)
11
+ - [Honeypots](#honeypots)
12
+ - [Malware Corpora](#malware-corpora)
13
+ - [Open Source Threat Intelligence](#open-source-threat-intelligence)
14
+ - [Tools](#tools)
15
+ - [Other Resources](#other-resources)
16
+ - [Detection and Classification](#detection-and-classification)
17
+ - [Online Scanners and Sandboxes](#online-scanners-and-sandboxes)
18
+ - [Domain Analysis](#domain-analysis)
19
+ - [Browser Malware](#browser-malware)
20
+ - [Documents and Shellcode](#documents-and-shellcode)
21
+ - [File Carving](#file-carving)
22
+ - [Deobfuscation](#deobfuscation)
23
+ - [Debugging and Reverse Engineering](#debugging-and-reverse-engineering)
24
+ - [Network](#network)
25
+ - [Memory Forensics](#memory-forensics)
26
+ - [Windows Artifacts](#windows-artifacts)
27
+ - [Storage and Workflow](#storage-and-workflow)
28
+ - [Miscellaneous](#miscellaneous)
29
+ - [Resources](#resources)
30
+ - [Books](#books)
31
+ - [Other](#other)
32
+ - [Related Awesome Lists](#related-awesome-lists)
33
+ - [Contributing](#contributing)
34
+ - [Thanks](#thanks)
35
+
36
+ View Chinese translation: [恶意软件分析大合集.md](恶意软件分析大合集.md).
37
+
38
+ ---
39
+
40
+ ## Malware Collection
41
+
42
+ ### Anonymizers
43
+
44
+ *Web traffic anonymizers for analysts.*
45
+
46
+ * [Anonymouse.org](http://anonymouse.org/) - A free, web based anonymizer.
47
+ * [OpenVPN](https://openvpn.net/) - VPN software and hosting solutions.
48
+ * [Privoxy](http://www.privoxy.org/) - An open source proxy server with some
49
+ privacy features.
50
+ * [Tor](https://www.torproject.org/) - The Onion Router, for browsing the web
51
+ without leaving traces of the client IP.
52
+
53
+ ### Honeypots
54
+
55
+ *Trap and collect your own samples.*
56
+
57
+ * [Conpot](https://github.com/mushorg/conpot) - ICS/SCADA honeypot.
58
+ * [Cowrie](https://github.com/micheloosterhof/cowrie) - SSH honeypot, based
59
+ on Kippo.
60
+ * [DemoHunter](https://github.com/RevengeComing/DemonHunter) - Low interaction Distributed Honeypots.
61
+ * [Dionaea](https://github.com/DinoTools/dionaea) - Honeypot designed to trap malware.
62
+ * [Glastopf](https://github.com/mushorg/glastopf) - Web application honeypot.
63
+ * [Honeyd](http://www.honeyd.org/) - Create a virtual honeynet.
64
+ * [HoneyDrive](https://bruteforce.gr/honeydrive/) - Honeypot bundle Linux distro.
65
+ * [Honeytrap](https://github.com/honeytrap/honeytrap) - Opensource system for running, monitoring and managing honeypots.
66
+ * [MHN](https://github.com/pwnlandia/mhn) - MHN is a centralized server for management and data collection of honeypots. MHN allows you to deploy sensors quickly and to collect data immediately, viewable from a neat web interface.
67
+ * [Mnemosyne](https://github.com/johnnykv/mnemosyne) - A normalizer for
68
+ honeypot data; supports Dionaea.
69
+ * [Thug](https://github.com/buffer/thug) - Low interaction honeyclient, for
70
+ investigating malicious websites.
71
+
72
+
73
+ ### Malware Corpora
74
+
75
+ *Malware samples collected for analysis.*
76
+
77
+ * [Clean MX](http://support.clean-mx.com/clean-mx/viruses.php) - Realtime
78
+ database of malware and malicious domains.
79
+ * [Contagio](http://contagiodump.blogspot.com/) - A collection of recent
80
+ malware samples and analyses.
81
+ * [Exploit Database](https://www.exploit-db.com/) - Exploit and shellcode
82
+ samples.
83
+ * [Infosec - CERT-PA](https://infosec.cert-pa.it/analyze/submission.html) - Malware samples collection and analysis.
84
+ * [InQuest Labs](https://labs.inquest.net) - Evergrowing searchable corpus of malicious Microsoft documents.
85
+ * [Javascript Mallware Collection](https://github.com/HynekPetrak/javascript-malware-collection) - Collection of almost 40.000 javascript malware samples
86
+ * [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - A resource providing
87
+ rapid identification and actionable context for malware investigations.
88
+ * [Malshare](https://malshare.com) - Large repository of malware actively
89
+ scrapped from malicious sites.
90
+ * [Ragpicker](https://github.com/robbyFux/Ragpicker) - Plugin based malware
91
+ crawler with pre-analysis and reporting functionalities
92
+ * [theZoo](https://github.com/ytisf/theZoo) - Live malware samples for
93
+ analysts.
94
+ * [Tracker h3x](http://tracker.h3x.eu/) - Agregator for malware corpus tracker
95
+ and malicious download sites.
96
+ * [vduddu malware repo](https://github.com/vduddu/Malware) - Collection of
97
+ various malware files and source code.
98
+ * [VirusBay](https://beta.virusbay.io/) - Community-Based malware repository and social network.
99
+ * [ViruSign](http://www.virussign.com/) - Malware database that detected by
100
+ many anti malware programs except ClamAV.
101
+ * [VirusShare](https://virusshare.com/) - Malware repository, registration
102
+ required.
103
+ * [VX Vault](http://vxvault.net) - Active collection of malware samples.
104
+ * [Zeltser's Sources](https://zeltser.com/malware-sample-sources/) - A list
105
+ of malware sample sources put together by Lenny Zeltser.
106
+ * [Zeus Source Code](https://github.com/Visgean/Zeus) - Source for the Zeus
107
+ trojan leaked in 2011.
108
+ * [VX Underground](http://vx-underground.org/) - Massive and growing collection of free malware samples.
109
+
110
+ ## Open Source Threat Intelligence
111
+
112
+ ### Tools
113
+
114
+ *Harvest and analyze IOCs.*
115
+
116
+ * [AbuseHelper](https://github.com/abusesa/abusehelper) - An open-source
117
+ framework for receiving and redistributing abuse feeds and threat intel.
118
+ * [AlienVault Open Threat Exchange](https://otx.alienvault.com/) - Share and
119
+ collaborate in developing Threat Intelligence.
120
+ * [Combine](https://github.com/mlsecproject/combine) - Tool to gather Threat
121
+ Intelligence indicators from publicly available sources.
122
+ * [Fileintel](https://github.com/keithjjones/fileintel) - Pull intelligence per file hash.
123
+ * [Hostintel](https://github.com/keithjjones/hostintel) - Pull intelligence per host.
124
+ * [IntelMQ](https://www.enisa.europa.eu/topics/csirt-cert-services/community-projects/incident-handling-automation) -
125
+ A tool for CERTs for processing incident data using a message queue.
126
+ * [IOC Editor](https://www.fireeye.com/services/freeware/ioc-editor.html) -
127
+ A free editor for XML IOC files.
128
+ * [iocextract](https://github.com/InQuest/python-iocextract) - Advanced Indicator
129
+ of Compromise (IOC) extractor, Python library and command-line tool.
130
+ * [ioc_writer](https://github.com/mandiant/ioc_writer) - Python library for
131
+ working with OpenIOC objects, from Mandiant.
132
+ * [MalPipe](https://github.com/silascutler/MalPipe) - Malware/IOC ingestion and
133
+ processing engine, that enriches collected data.
134
+ * [Massive Octo Spice](https://github.com/csirtgadgets/massive-octo-spice) -
135
+ Previously known as CIF (Collective Intelligence Framework). Aggregates IOCs
136
+ from various lists. Curated by the
137
+ [CSIRT Gadgets Foundation](http://csirtgadgets.org/collective-intelligence-framework).
138
+ * [MISP](https://github.com/MISP/MISP) - Malware Information Sharing
139
+ Platform curated by [The MISP Project](http://www.misp-project.org/).
140
+ * [Pulsedive](https://pulsedive.com) - Free, community-driven threat intelligence platform collecting IOCs from open-source feeds.
141
+ * [PyIOCe](https://github.com/pidydx/PyIOCe) - A Python OpenIOC editor.
142
+ * [RiskIQ](https://community.riskiq.com/) - Research, connect, tag and
143
+ share IPs and domains. (Was PassiveTotal.)
144
+ * [threataggregator](https://github.com/jpsenior/threataggregator) -
145
+ Aggregates security threats from a number of sources, including some of
146
+ those listed below in [other resources](#other-resources).
147
+ * [ThreatConnect](https://threatconnect.com/free/) - TC Open allows you to see and
148
+ share open source threat data, with support and validation from our free community.
149
+ * [ThreatCrowd](https://www.threatcrowd.org/) - A search engine for threats,
150
+ with graphical visualization.
151
+ * [ThreatIngestor](https://github.com/InQuest/ThreatIngestor/) - Build
152
+ automated threat intel pipelines sourcing from Twitter, RSS, GitHub, and
153
+ more.
154
+ * [ThreatTracker](https://github.com/michael-yip/ThreatTracker) - A Python
155
+ script to monitor and generate alerts based on IOCs indexed by a set of
156
+ Google Custom Search Engines.
157
+ * [TIQ-test](https://github.com/mlsecproject/tiq-test) - Data visualization
158
+ and statistical analysis of Threat Intelligence feeds.
159
+
160
+ ### Other Resources
161
+
162
+ *Threat intelligence and IOC resources.*
163
+
164
+ * [Autoshun](https://www.autoshun.org/) ([list](https://www.autoshun.org/files/shunlist.csv)) -
165
+ Snort plugin and blocklist.
166
+ * [Bambenek Consulting Feeds](http://osint.bambenekconsulting.com/feeds/) -
167
+ OSINT feeds based on malicious DGA algorithms.
168
+ * [Fidelis Barncat](https://www.fidelissecurity.com/resources/fidelis-barncat) -
169
+ Extensive malware config database (must request access).
170
+ * [CI Army](http://cinsscore.com/) ([list](http://cinsscore.com/list/ci-badguys.txt)) -
171
+ Network security blocklists.
172
+ * [Critical Stack- Free Intel Market](https://intel.criticalstack.com) - Free
173
+ intel aggregator with deduplication featuring 90+ feeds and over 1.2M indicators.
174
+ * [Cybercrime tracker](http://cybercrime-tracker.net/) - Multiple botnet active tracker.
175
+ * [FireEye IOCs](https://github.com/fireeye/iocs) - Indicators of Compromise
176
+ shared publicly by FireEye.
177
+ * [FireHOL IP Lists](https://iplists.firehol.org/) - Analytics for 350+ IP lists
178
+ with a focus on attacks, malware and abuse. Evolution, Changes History,
179
+ Country Maps, Age of IPs listed, Retention Policy, Overlaps.
180
+ * [HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.
181
+ * [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol.
182
+ * [Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.
183
+ * [InQuest REPdb](https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources.
184
+ * [InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.
185
+ * [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and
186
+ searchable incident database, with a web [API](https://dshield.org/api/).
187
+ ([unofficial Python library](https://github.com/rshipp/python-dshield)).
188
+ * [malc0de](http://malc0de.com/database/) - Searchable incident database.
189
+ * [Malware Domain List](http://www.malwaredomainlist.com/) - Search and share
190
+ malicious URLs.
191
+ * [MetaDefender Threat Intelligence Feed](https://www.opswat.com/developers/threat-intelligence-feed) -
192
+ List of the most looked up file hashes from MetaDefender Cloud.
193
+ * [OpenIOC](https://www.fireeye.com/services/freeware.html) - Framework for sharing threat intelligence.
194
+ * [Proofpoint Threat Intelligence](https://www.proofpoint.com/us/products/et-intelligence) -
195
+ Rulesets and more. (Formerly Emerging Threats.)
196
+ * [Ransomware overview](https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml) -
197
+ A list of ransomware overview with details, detection and prevention.
198
+ * [STIX - Structured Threat Information eXpression](http://stixproject.github.io) -
199
+ Standardized language to represent and share cyber threat information.
200
+ Related efforts from [MITRE](https://www.mitre.org/):
201
+ - [CAPEC - Common Attack Pattern Enumeration and Classification](http://capec.mitre.org/)
202
+ - [CybOX - Cyber Observables eXpression](http://cyboxproject.github.io)
203
+ - [MAEC - Malware Attribute Enumeration and Characterization](http://maec.mitre.org/)
204
+ - [TAXII - Trusted Automated eXchange of Indicator Information](http://taxiiproject.github.io)
205
+ * [SystemLookup](https://www.systemlookup.com/) - SystemLookup hosts a collection of lists that provide information on
206
+ the components of legitimate and potentially unwanted programs.
207
+ * [ThreatMiner](https://www.threatminer.org/) - Data mining portal for threat
208
+ intelligence, with search.
209
+ * [threatRECON](https://threatrecon.co/) - Search for indicators, up to 1000
210
+ free per month.
211
+ * [ThreatShare](https://threatshare.io/) - C2 panel tracker
212
+ * [Yara rules](https://github.com/Yara-Rules/rules) - Yara rules repository.
213
+ * [YETI](https://github.com/yeti-platform/yeti) - Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository.
214
+ * [ZeuS Tracker](https://zeustracker.abuse.ch/blocklist.php) - ZeuS
215
+ blocklists.
216
+
217
+ ## Detection and Classification
218
+
219
+ *Antivirus and other malware identification tools*
220
+
221
+ * [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Wrapper for a
222
+ variety of tools for reporting on Windows PE files.
223
+ * [Assemblyline](https://cybercentrecanada.github.io/assemblyline4_docs/) - A scalable file triage and malware analysis system integrating the cyber security community's best tools..
224
+ * [BinaryAlert](https://github.com/airbnb/binaryalert) - An open source, serverless
225
+ AWS pipeline that scans and alerts on uploaded files based on a set of
226
+ YARA rules.
227
+ * [capa](https://github.com/fireeye/capa) - Detects capabilities in executable files.
228
+ * [chkrootkit](http://www.chkrootkit.org/) - Local Linux rootkit detection.
229
+ * [ClamAV](http://www.clamav.net/) - Open source antivirus engine.
230
+ * [Detect It Easy(DiE)](https://github.com/horsicq/Detect-It-Easy) - A program for
231
+ determining types of files.
232
+ * [Exeinfo PE](http://exeinfo.pe.hu/) - Packer, compressor detector, unpack
233
+ info, internal exe tools.
234
+ * [ExifTool](https://sno.phy.queensu.ca/~phil/exiftool/) - Read, write and
235
+ edit file metadata.
236
+ * [File Scanning Framework](https://github.com/EmersonElectricCo/fsf) -
237
+ Modular, recursive file scanning solution.
238
+ * [fn2yara](https://github.com/cmu-sei/pharos) - FN2Yara is a tool to generate
239
+ Yara signatures for matching functions (code) in an executable program.
240
+ * [Generic File Parser](https://github.com/uppusaikiran/generic-parser) - A Single Library Parser to extract meta information,static analysis and detect macros within the files.
241
+ * [hashdeep](https://github.com/jessek/hashdeep) - Compute digest hashes with
242
+ a variety of algorithms.
243
+ * [HashCheck](https://github.com/gurnec/HashCheck) - Windows shell extension
244
+ to compute hashes with a variety of algorithms.
245
+ * [Loki](https://github.com/Neo23x0/Loki) - Host based scanner for IOCs.
246
+ * [Malfunction](https://github.com/Dynetics/Malfunction) - Catalog and
247
+ compare malware at a function level.
248
+ * [Manalyze](https://github.com/JusticeRage/Manalyze) - Static analyzer for PE
249
+ executables.
250
+ * [MASTIFF](https://github.com/KoreLogicSecurity/mastiff) - Static analysis
251
+ framework.
252
+ * [MultiScanner](https://github.com/mitre/multiscanner) - Modular file
253
+ scanning/analysis framework
254
+ * [Nauz File Detector(NFD)](https://github.com/horsicq/Nauz-File-Detector) - Linker/Compiler/Tool detector for Windows, Linux and MacOS.
255
+ * [nsrllookup](https://github.com/rjhansen/nsrllookup) - A tool for looking
256
+ up hashes in NIST's National Software Reference Library database.
257
+ * [packerid](https://github.com/sooshie/packerid) - A cross-platform
258
+ Python alternative to PEiD.
259
+ * [PE-bear](https://hshrzd.wordpress.com/pe-bear/) - Reversing tool for PE
260
+ files.
261
+ * [PEframe](https://github.com/guelfoweb/peframe) - PEframe is an open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.
262
+ * [PEV](http://pev.sourceforge.net/) - A multiplatform toolkit to work with PE
263
+ files, providing feature-rich tools for proper analysis of suspicious binaries.
264
+ * [PortEx](https://github.com/katjahahn/PortEx) - Java library to analyse PE files with a special focus on malware analysis and PE malformation robustness.
265
+ * [Quark-Engine](https://github.com/quark-engine/quark-engine) - An Obfuscation-Neglect Android Malware Scoring System
266
+ * [Rootkit Hunter](http://rkhunter.sourceforge.net/) - Detect Linux rootkits.
267
+ * [ssdeep](https://ssdeep-project.github.io/ssdeep/) - Compute fuzzy hashes.
268
+ * [totalhash.py](https://gist.github.com/gleblanc1783/3c8e6b379fa9d646d401b96ab5c7877f) -
269
+ Python script for easy searching of the [TotalHash.cymru.com](https://totalhash.cymru.com/)
270
+ database.
271
+ * [TrID](http://mark0.net/soft-trid-e.html) - File identifier.
272
+ * [YARA](https://plusvic.github.io/yara/) - Pattern matching tool for
273
+ analysts.
274
+ * [Yara rules generator](https://github.com/Neo23x0/yarGen) - Generate
275
+ yara rules based on a set of malware samples. Also contains a good
276
+ strings DB to avoid false positives.
277
+ * [Yara Finder](https://github.com/uppusaikiran/yara-finder) - A simple tool to yara match the file against various yara rules to find the indicators of suspicion.
278
+
279
+
280
+ ## Online Scanners and Sandboxes
281
+
282
+ *Web-based multi-AV scanners, and malware sandboxes for automated analysis.*
283
+
284
+ * [anlyz.io](https://sandbox.anlyz.io/) - Online sandbox.
285
+ * [any.run](https://app.any.run/) - Online interactive sandbox.
286
+ * [AndroTotal](https://andrototal.org/) - Free online analysis of APKs
287
+ against multiple mobile antivirus apps.
288
+ * [BoomBox](https://github.com/nbeede/BoomBox) - Automatic deployment of Cuckoo
289
+ Sandbox malware lab using Packer and Vagrant.
290
+ * [Cryptam](http://www.cryptam.com/) - Analyze suspicious office documents.
291
+ * [Cuckoo Sandbox](https://cuckoosandbox.org/) - Open source, self hosted
292
+ sandbox and automated analysis system.
293
+ * [cuckoo-modified](https://github.com/brad-accuvant/cuckoo-modified) - Modified
294
+ version of Cuckoo Sandbox released under the GPL. Not merged upstream due to
295
+ legal concerns by the author.
296
+ * [cuckoo-modified-api](https://github.com/keithjjones/cuckoo-modified-api) - A
297
+ Python API used to control a cuckoo-modified sandbox.
298
+ * [DeepViz](https://www.deepviz.com/) - Multi-format file analyzer with
299
+ machine-learning classification.
300
+ * [detux](https://github.com/detuxsandbox/detux/) - A sandbox developed to do
301
+ traffic analysis of Linux malwares and capturing IOCs.
302
+ * [DRAKVUF](https://github.com/tklengyel/drakvuf) - Dynamic malware analysis
303
+ system.
304
+ * [filescan.io](https://www.filescan.io/) - Static malware analysis, VBA/Powershell/VBS/JS Emulation
305
+ * [firmware.re](http://firmware.re/) - Unpacks, scans and analyzes almost any
306
+ firmware package.
307
+ * [HaboMalHunter](https://github.com/Tencent/HaboMalHunter) - An Automated Malware
308
+ Analysis Tool for Linux ELF Files.
309
+ * [Hybrid Analysis](https://www.hybrid-analysis.com/) - Online malware
310
+ analysis tool, powered by VxSandbox.
311
+ * [Intezer](https://analyze.intezer.com) - Detect, analyze, and categorize malware by
312
+ identifying code reuse and code similarities.
313
+ * [IRMA](http://irma.quarkslab.com/) - An asynchronous and customizable
314
+ analysis platform for suspicious files.
315
+ * [Joe Sandbox](https://www.joesecurity.org) - Deep malware analysis with Joe Sandbox.
316
+ * [Jotti](https://virusscan.jotti.org/en) - Free online multi-AV scanner.
317
+ * [Limon](https://github.com/monnappa22/Limon) - Sandbox for Analyzing Linux Malware.
318
+ * [Malheur](https://github.com/rieck/malheur) - Automatic sandboxed analysis
319
+ of malware behavior.
320
+ * [malice.io](https://github.com/maliceio/malice) - Massively scalable malware analysis framework.
321
+ * [malsub](https://github.com/diogo-fernan/malsub) - A Python RESTful API framework for
322
+ online malware and URL analysis services.
323
+ * [Malware config](https://malwareconfig.com/) - Extract, decode and display online
324
+ the configuration settings from common malwares.
325
+ * [MalwareAnalyser.io](https://malwareanalyser.io/) - Online malware anomaly-based static analyser with heuristic detection engine powered by data mining and machine learning.
326
+ * [Malwr](https://malwr.com/) - Free analysis with an online Cuckoo Sandbox
327
+ instance.
328
+ * [MetaDefender Cloud](https://metadefender.opswat.com/ ) - Scan a file, hash, IP, URL or
329
+ domain address for malware for free.
330
+ * [NetworkTotal](https://www.networktotal.com/index.html) - A service that analyzes
331
+ pcap files and facilitates the quick detection of viruses, worms, trojans, and all
332
+ kinds of malware using Suricata configured with EmergingThreats Pro.
333
+ * [Noriben](https://github.com/Rurik/Noriben) - Uses Sysinternals Procmon to
334
+ collect information about malware in a sandboxed environment.
335
+ * [PacketTotal](https://packettotal.com/) - PacketTotal is an online engine for analyzing .pcap files, and visualizing the network traffic within.
336
+ * [PDF Examiner](http://www.pdfexaminer.com/) - Analyse suspicious PDF files.
337
+ * [ProcDot](http://www.procdot.com) - A graphical malware analysis tool kit.
338
+ * [Recomposer](https://github.com/secretsquirrel/recomposer) - A helper
339
+ script for safely uploading binaries to sandbox sites.
340
+ * [sandboxapi](https://github.com/InQuest/python-sandboxapi) - Python library for
341
+ building integrations with several open source and commercial malware sandboxes.
342
+ * [SEE](https://github.com/F-Secure/see) - Sandboxed Execution Environment (SEE)
343
+ is a framework for building test automation in secured Environments.
344
+ * [SEKOIA Dropper Analysis](https://malware.sekoia.fr/) - Online dropper analysis (Js, VBScript, Microsoft Office, PDF).
345
+ * [VirusTotal](https://www.virustotal.com/) - Free online analysis of malware
346
+ samples and URLs
347
+ * [Visualize_Logs](https://github.com/keithjjones/visualize_logs) - Open source
348
+ visualization library and command line tools for logs. (Cuckoo, Procmon, more
349
+ to come...)
350
+ * [Zeltser's List](https://zeltser.com/automated-malware-analysis/) - Free
351
+ automated sandboxes and services, compiled by Lenny Zeltser.
352
+
353
+ ## Domain Analysis
354
+
355
+ *Inspect domains and IP addresses.*
356
+
357
+ * [AbuseIPDB](https://www.abuseipdb.com/) - AbuseIPDB is a project dedicated
358
+ to helping combat the spread of hackers, spammers, and abusive activity on the internet.
359
+ * [badips.com](https://www.badips.com/) - Community based IP blacklist service.
360
+ * [boomerang](https://github.com/EmersonElectricCo/boomerang) - A tool designed
361
+ for consistent and safe capture of off network web resources.
362
+ * [Cymon](https://cymon.io/) - Threat intelligence tracker, with IP/domain/hash
363
+ search.
364
+ * [Desenmascara.me](http://desenmascara.me) - One click tool to retrieve as
365
+ much metadata as possible for a website and to assess its good standing.
366
+ * [Dig](https://networking.ringofsaturn.com/) - Free online dig and other
367
+ network tools.
368
+ * [dnstwist](https://github.com/elceef/dnstwist) - Domain name permutation
369
+ engine for detecting typo squatting, phishing and corporate espionage.
370
+ * [IPinfo](https://github.com/hiddenillusion/IPinfo) - Gather information
371
+ about an IP or domain by searching online resources.
372
+ * [Machinae](https://github.com/hurricanelabs/machinae) - OSINT tool for
373
+ gathering information about URLs, IPs, or hashes. Similar to Automator.
374
+ * [mailchecker](https://github.com/FGRibreau/mailchecker) - Cross-language
375
+ temporary email detection library.
376
+ * [MaltegoVT](https://github.com/michael-yip/MaltegoVT) - Maltego transform
377
+ for the VirusTotal API. Allows domain/IP research, and searching for file
378
+ hashes and scan reports.
379
+ * [Multi rbl](http://multirbl.valli.org/) - Multiple DNS blacklist and forward
380
+ confirmed reverse DNS lookup over more than 300 RBLs.
381
+ * [NormShield Services](https://services.normshield.com/) - Free API Services
382
+ for detecting possible phishing domains, blacklisted ip addresses and breached
383
+ accounts.
384
+ * [PhishStats](https://phishstats.info/) - Phishing Statistics with search for
385
+ IP, domain and website title
386
+ * [Spyse](https://spyse.com/) - subdomains, whois, realted domains, DNS, hosts AS, SSL/TLS info,
387
+ * [SecurityTrails](https://securitytrails.com/) - Historical and current WHOIS,
388
+ historical and current DNS records, similar domains, certificate information
389
+ and other domain and IP related API and tools.
390
+ * [SpamCop](https://www.spamcop.net/bl.shtml) - IP based spam block list.
391
+ * [SpamHaus](https://www.spamhaus.org/lookup/) - Block list based on
392
+ domains and IPs.
393
+ * [Sucuri SiteCheck](https://sitecheck.sucuri.net/) - Free Website Malware
394
+ and Security Scanner.
395
+ * [Talos Intelligence](https://talosintelligence.com/) - Search for IP, domain
396
+ or network owner. (Previously SenderBase.)
397
+ * [TekDefense Automater](http://www.tekdefense.com/automater/) - OSINT tool
398
+ for gathering information about URLs, IPs, or hashes.
399
+ * [URLhaus](https://urlhaus.abuse.ch/) - A project from abuse.ch with the goal
400
+ of sharing malicious URLs that are being used for malware distribution.
401
+ * [URLQuery](http://urlquery.net/) - Free URL Scanner.
402
+ * [urlscan.io](https://urlscan.io/) - Free URL Scanner & domain information.
403
+ * [Whois](https://whois.domaintools.com/) - DomainTools free online whois
404
+ search.
405
+ * [Zeltser's List](https://zeltser.com/lookup-malicious-websites/) - Free
406
+ online tools for researching malicious websites, compiled by Lenny Zeltser.
407
+ * [ZScalar Zulu](https://zulu.zscaler.com/#) - Zulu URL Risk Analyzer.
408
+
409
+ ## Browser Malware
410
+
411
+ *Analyze malicious URLs. See also the [domain analysis](#domain-analysis) and
412
+ [documents and shellcode](#documents-and-shellcode) sections.*
413
+
414
+ * [Bytecode Viewer](https://github.com/Konloch/bytecode-viewer) - Combines
415
+ multiple Java bytecode viewers and decompilers into one tool, including
416
+ APK/DEX support.
417
+ * [Firebug](https://getfirebug.com/) - Firefox extension for web development.
418
+ * [Java Decompiler](http://jd.benow.ca/) - Decompile and inspect Java apps.
419
+ * [Java IDX Parser](https://github.com/Rurik/Java_IDX_Parser/) - Parses Java
420
+ IDX cache files.
421
+ * [JSDetox](http://www.relentless-coding.com/projects/jsdetox/) - JavaScript
422
+ malware analysis tool.
423
+ * [jsunpack-n](https://github.com/urule99/jsunpack-n) - A javascript
424
+ unpacker that emulates browser functionality.
425
+ * [Krakatau](https://github.com/Storyyeller/Krakatau) - Java decompiler,
426
+ assembler, and disassembler.
427
+ * [Malzilla](http://malzilla.sourceforge.net/) - Analyze malicious web pages.
428
+ * [RABCDAsm](https://github.com/CyberShadow/RABCDAsm) - A "Robust
429
+ ActionScript Bytecode Disassembler."
430
+ * [SWF Investigator](https://labs.adobe.com/technologies/swfinvestigator/) -
431
+ Static and dynamic analysis of SWF applications.
432
+ * [swftools](http://www.swftools.org/) - Tools for working with Adobe Flash
433
+ files.
434
+ * [xxxswf](http://hooked-on-mnemonics.blogspot.com/2011/12/xxxswfpy.html) - A
435
+ Python script for analyzing Flash files.
436
+
437
+ ## Documents and Shellcode
438
+
439
+ *Analyze malicious JS and shellcode from PDFs and Office documents. See also
440
+ the [browser malware](#browser-malware) section.*
441
+
442
+ * [AnalyzePDF](https://github.com/hiddenillusion/AnalyzePDF) - A tool for
443
+ analyzing PDFs and attempting to determine whether they are malicious.
444
+ * [box-js](https://github.com/CapacitorSet/box-js) - A tool for studying JavaScript
445
+ malware, featuring JScript/WScript support and ActiveX emulation.
446
+ * [diStorm](http://www.ragestorm.net/distorm/) - Disassembler for analyzing
447
+ malicious shellcode.
448
+ * [InQuest Deep File Inspection](https://labs.inquest.net/dfi) - Upload common malware lures for Deep File Inspection and heuristical analysis.
449
+ * [JS Beautifier](http://jsbeautifier.org/) - JavaScript unpacking and deobfuscation.
450
+ * [libemu](http://libemu.carnivore.it/) - Library and tools for x86 shellcode
451
+ emulation.
452
+ * [malpdfobj](https://github.com/9b/malpdfobj) - Deconstruct malicious PDFs
453
+ into a JSON representation.
454
+ * [OfficeMalScanner](http://www.reconstructer.org/code.html) - Scan for
455
+ malicious traces in MS Office documents.
456
+ * [olevba](http://www.decalage.info/python/olevba) - A script for parsing OLE
457
+ and OpenXML documents and extracting useful information.
458
+ * [Origami PDF](https://code.google.com/archive/p/origami-pdf) - A tool for
459
+ analyzing malicious PDFs, and more.
460
+ * [PDF Tools](https://blog.didierstevens.com/programs/pdf-tools/) - pdfid,
461
+ pdf-parser, and more from Didier Stevens.
462
+ * [PDF X-Ray Lite](https://github.com/9b/pdfxray_lite) - A PDF analysis tool,
463
+ the backend-free version of PDF X-RAY.
464
+ * [peepdf](http://eternal-todo.com/tools/peepdf-pdf-analysis-tool) - Python
465
+ tool for exploring possibly malicious PDFs.
466
+ * [QuickSand](https://www.quicksand.io/) - QuickSand is a compact C framework
467
+ to analyze suspected malware documents to identify exploits in streams of different
468
+ encodings and to locate and extract embedded executables.
469
+ * [Spidermonkey](https://developer.mozilla.org/en-US/docs/Mozilla/Projects/SpiderMonkey) -
470
+ Mozilla's JavaScript engine, for debugging malicious JS.
471
+
472
+ ## File Carving
473
+
474
+ *For extracting files from inside disk and memory images.*
475
+
476
+ * [bulk_extractor](https://github.com/simsong/bulk_extractor) - Fast file
477
+ carving tool.
478
+ * [EVTXtract](https://github.com/williballenthin/EVTXtract) - Carve Windows
479
+ Event Log files from raw binary data.
480
+ * [Foremost](http://foremost.sourceforge.net/) - File carving tool designed
481
+ by the US Air Force.
482
+ * [hachoir3](https://github.com/vstinner/hachoir3) - Hachoir is a Python library
483
+ to view and edit a binary stream field by field.
484
+ * [Scalpel](https://github.com/sleuthkit/scalpel) - Another data carving
485
+ tool.
486
+ * [SFlock](https://github.com/jbremer/sflock) - Nested archive
487
+ extraction/unpacking (used in Cuckoo Sandbox).
488
+
489
+ ## Deobfuscation
490
+
491
+ *Reverse XOR and other code obfuscation methods.*
492
+
493
+ * [Balbuzard](https://bitbucket.org/decalage/balbuzard/wiki/Home) - A malware
494
+ analysis tool for reversing obfuscation (XOR, ROL, etc) and more.
495
+ * [de4dot](https://github.com/0xd4d/de4dot) - .NET deobfuscator and
496
+ unpacker.
497
+ * [ex_pe_xor](http://hooked-on-mnemonics.blogspot.com/2014/04/expexorpy.html)
498
+ & [iheartxor](http://hooked-on-mnemonics.blogspot.com/p/iheartxor.html) -
499
+ Two tools from Alexander Hanel for working with single-byte XOR encoded
500
+ files.
501
+ * [FLOSS](https://github.com/fireeye/flare-floss) - The FireEye Labs Obfuscated
502
+ String Solver uses advanced static analysis techniques to automatically
503
+ deobfuscate strings from malware binaries.
504
+ * [NoMoreXOR](https://github.com/hiddenillusion/NoMoreXOR) - Guess a 256 byte
505
+ XOR key using frequency analysis.
506
+ * [PackerAttacker](https://github.com/BromiumLabs/PackerAttacker) - A generic
507
+ hidden code extractor for Windows malware.
508
+ * [PyInstaller Extractor](https://github.com/extremecoders-re/pyinstxtractor) -
509
+ A Python script to extract the contents of a PyInstaller generated Windows
510
+ executable file. The contents of the pyz file (usually pyc files) present
511
+ inside the executable are also extracted and automatically fixed so that a
512
+ Python bytecode decompiler will recognize it.
513
+ * [uncompyle6](https://github.com/rocky/python-uncompyle6/) - A cross-version
514
+ Python bytecode decompiler. Translates Python bytecode back into equivalent
515
+ Python source code.
516
+ * [un{i}packer](https://github.com/unipacker/unipacker) - Automatic and
517
+ platform-independent unpacker for Windows binaries based on emulation.
518
+ * [unpacker](https://github.com/malwaremusings/unpacker/) - Automated malware
519
+ unpacker for Windows malware based on WinAppDbg.
520
+ * [unxor](https://github.com/tomchop/unxor/) - Guess XOR keys using
521
+ known-plaintext attacks.
522
+ * [VirtualDeobfuscator](https://github.com/jnraber/VirtualDeobfuscator) -
523
+ Reverse engineering tool for virtualization wrappers.
524
+ * [XORBruteForcer](http://eternal-todo.com/var/scripts/xorbruteforcer) -
525
+ A Python script for brute forcing single-byte XOR keys.
526
+ * [XORSearch & XORStrings](https://blog.didierstevens.com/programs/xorsearch/) -
527
+ A couple programs from Didier Stevens for finding XORed data.
528
+ * [xortool](https://github.com/hellman/xortool) - Guess XOR key length, as
529
+ well as the key itself.
530
+
531
+ ## Debugging and Reverse Engineering
532
+
533
+ *Disassemblers, debuggers, and other static and dynamic analysis tools.*
534
+
535
+ * [angr](https://github.com/angr/angr) - Platform-agnostic binary analysis
536
+ framework developed at UCSB's Seclab.
537
+ * [bamfdetect](https://github.com/bwall/bamfdetect) - Identifies and extracts
538
+ information from bots and other malware.
539
+ * [BAP](https://github.com/BinaryAnalysisPlatform/bap) - Multiplatform and
540
+ open source (MIT) binary analysis framework developed at CMU's Cylab.
541
+ * [BARF](https://github.com/programa-stic/barf-project) - Multiplatform, open
542
+ source Binary Analysis and Reverse engineering Framework.
543
+ * [binnavi](https://github.com/google/binnavi) - Binary analysis IDE for
544
+ reverse engineering based on graph visualization.
545
+ * [Binary ninja](https://binary.ninja/) - A reversing engineering platform
546
+ that is an alternative to IDA.
547
+ * [Binwalk](https://github.com/devttys0/binwalk) - Firmware analysis tool.
548
+ * [BluePill](https://github.com/season-lab/bluepill) - Framework for executing and debugging evasive malware and protected executables.
549
+ * [Capstone](https://github.com/aquynh/capstone) - Disassembly framework for
550
+ binary analysis and reversing, with support for many architectures and
551
+ bindings in several languages.
552
+ * [codebro](https://github.com/hugsy/codebro) - Web based code browser using
553
+  clang to provide basic code analysis.
554
+ * [Cutter](https://github.com/radareorg/cutter) - GUI for Radare2.
555
+ * [DECAF (Dynamic Executable Code Analysis Framework)](https://github.com/sycurelab/DECAF)
556
+ - A binary analysis platform based   on QEMU. DroidScope is now an extension to DECAF.
557
+ * [dnSpy](https://github.com/0xd4d/dnSpy) - .NET assembly editor, decompiler
558
+ and debugger.
559
+ * [dotPeek](https://www.jetbrains.com/decompiler/) - Free .NET Decompiler and
560
+ Assembly Browser.
561
+ * [Evan's Debugger (EDB)](http://codef00.com/projects#debugger) - A
562
+ modular debugger with a Qt GUI.
563
+ * [Fibratus](https://github.com/rabbitstack/fibratus) - Tool for exploration
564
+ and tracing of the Windows kernel.
565
+ * [FPort](https://www.mcafee.com/us/downloads/free-tools/fport.aspx) - Reports
566
+ open TCP/IP and UDP ports in a live system and maps them to the owning application.
567
+ * [GDB](http://www.sourceware.org/gdb/) - The GNU debugger.
568
+ * [GEF](https://github.com/hugsy/gef) - GDB Enhanced Features, for exploiters
569
+ and reverse engineers.
570
+ * [Ghidra](https://github.com/NationalSecurityAgency/ghidra) - A software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate.
571
+ * [hackers-grep](https://github.com/codypierce/hackers-grep) - A utility to
572
+ search for strings in PE executables including imports, exports, and debug
573
+ symbols.
574
+ * [Hopper](https://www.hopperapp.com/) - The macOS and Linux Disassembler.
575
+ * [IDA Pro](https://www.hex-rays.com/products/ida/index.shtml) - Windows
576
+ disassembler and debugger, with a free evaluation version.
577
+ * [IDR](https://github.com/crypto2011/IDR) - Interactive Delphi Reconstructor
578
+ is a decompiler of Delphi executable files and dynamic libraries.
579
+ * [Immunity Debugger](http://debugger.immunityinc.com/) - Debugger for
580
+ malware analysis and more, with a Python API.
581
+ * [ILSpy](http://ilspy.net/) - ILSpy is the open-source .NET assembly browser and decompiler.
582
+ * [Kaitai Struct](http://kaitai.io/) - DSL for file formats / network protocols /
583
+ data structures reverse engineering and dissection, with code generation
584
+ for C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
585
+ * [LIEF](https://lief.quarkslab.com/) - LIEF provides a cross-platform library
586
+ to parse, modify and abstract ELF, PE and MachO formats.
587
+ * [ltrace](http://ltrace.org/) - Dynamic analysis for Linux executables.
588
+ * [mac-a-mal](https://github.com/phdphuc/mac-a-mal) - An automated framework
589
+ for mac malware hunting.
590
+ * [objdump](https://en.wikipedia.org/wiki/Objdump) - Part of GNU binutils,
591
+ for static analysis of Linux binaries.
592
+ * [OllyDbg](http://www.ollydbg.de/) - An assembly-level debugger for Windows
593
+ executables.
594
+ * [OllyDumpEx](https://low-priority.appspot.com/ollydumpex/) - Dump memory
595
+ from (unpacked) malware Windows process and store raw or rebuild PE file.
596
+ This is a plugin for OllyDbg, Immunity Debugger, IDA Pro, WinDbg, and x64dbg.
597
+ * [PANDA](https://github.com/moyix/panda) - Platform for Architecture-Neutral
598
+ Dynamic Analysis.
599
+ * [PEDA](https://github.com/longld/peda) - Python Exploit Development
600
+ Assistance for GDB, an enhanced display with added commands.
601
+ * [pestudio](https://winitor.com/) - Perform static analysis of Windows
602
+ executables.
603
+ * [Pharos](https://github.com/cmu-sei/pharos) - The Pharos binary analysis framework
604
+ can be used to perform automated static analysis of binaries.
605
+ * [plasma](https://github.com/plasma-disassembler/plasma) - Interactive
606
+ disassembler for x86/ARM/MIPS.
607
+ * [PPEE (puppy)](https://www.mzrst.com/) - A Professional PE file Explorer for
608
+ reversers, malware researchers and those who want to statically inspect PE
609
+ files in more detail.
610
+ * [Process Explorer](https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer) -
611
+ Advanced task manager for Windows.
612
+ * [Process Hacker](http://processhacker.sourceforge.net/) - Tool that monitors
613
+ system resources.
614
+ * [Process Monitor](https://docs.microsoft.com/en-us/sysinternals/downloads/procmon) -
615
+ Advanced monitoring tool for Windows programs.
616
+ * [PSTools](https://docs.microsoft.com/en-us/sysinternals/downloads/pstools) - Windows
617
+ command-line tools that help manage and investigate live systems.
618
+ * [Pyew](https://github.com/joxeankoret/pyew) - Python tool for malware
619
+ analysis.
620
+ * [PyREBox](https://github.com/Cisco-Talos/pyrebox) - Python scriptable reverse
621
+ engineering sandbox by the Talos team at Cisco.
622
+ * [Qiling Framework](https://www.qiling.io/) - Cross platform emulation and sanboxing
623
+ framework with instruments for binary analysis.
624
+ * [QKD](https://github.com/ispras/qemu/releases/) - QEMU with embedded WinDbg
625
+ server for stealth debugging.
626
+ * [Radare2](http://www.radare.org/r/) - Reverse engineering framework, with
627
+ debugger support.
628
+ * [RegShot](https://sourceforge.net/projects/regshot/) - Registry compare utility
629
+ that compares snapshots.
630
+ * [RetDec](https://retdec.com/) - Retargetable machine-code decompiler with an
631
+ [online decompilation service](https://retdec.com/decompilation/) and
632
+ [API](https://retdec.com/api/) that you can use in your tools.
633
+ * [ROPMEMU](https://github.com/Cisco-Talos/ROPMEMU) - A framework to analyze, dissect
634
+ and decompile complex code-reuse attacks.
635
+ * [Scylla Imports Reconstructor](https://github.com/NtQuery/Scylla) - Find and fix
636
+ the IAT of an unpacked / dumped PE32 malware.
637
+ * [ScyllaHide](https://github.com/x64dbg/ScyllaHide) - An Anti-Anti-Debug library
638
+ and plugin for OllyDbg, x64dbg, IDA Pro, and TitanEngine.
639
+ * [SMRT](https://github.com/pidydx/SMRT) - Sublime Malware Research Tool, a
640
+ plugin for Sublime 3 to aid with malware analyis.
641
+ * [strace](https://sourceforge.net/projects/strace/) - Dynamic analysis for
642
+ Linux executables.
643
+ * [StringSifter](https://github.com/fireeye/stringsifter) - A machine learning tool
644
+ that automatically ranks strings based on their relevance for malware analysis.
645
+ * [Triton](https://triton.quarkslab.com/) - A dynamic binary analysis (DBA) framework.
646
+ * [Udis86](https://github.com/vmt/udis86) - Disassembler library and tool
647
+ for x86 and x86_64.
648
+ * [Vivisect](https://github.com/vivisect/vivisect) - Python tool for
649
+ malware analysis.
650
+ * [WinDbg](https://developer.microsoft.com/en-us/windows/hardware/download-windbg) - multipurpose debugger for the Microsoft Windows computer operating system, used to debug user mode applications, device drivers, and the kernel-mode memory dumps.
651
+ * [X64dbg](https://github.com/x64dbg/) - An open-source x64/x32 debugger for windows.
652
+
653
+ ## Network
654
+
655
+ *Analyze network interactions.*
656
+
657
+ * [Bro](https://www.bro.org) - Protocol analyzer that operates at incredible
658
+ scale; both file and network protocols.
659
+ * [BroYara](https://github.com/hempnall/broyara) - Use Yara rules from Bro.
660
+ * [CapTipper](https://github.com/omriher/CapTipper) - Malicious HTTP traffic
661
+ explorer.
662
+ * [chopshop](https://github.com/MITRECND/chopshop) - Protocol analysis and
663
+ decoding framework.
664
+ * [CloudShark](https://www.cloudshark.org) - Web-based tool for packet analysis
665
+ and malware traffic detection.
666
+ * [FakeNet-NG](https://github.com/fireeye/flare-fakenet-ng) - Next generation
667
+ dynamic network analysis tool.
668
+ * [Fiddler](https://www.telerik.com/fiddler) - Intercepting web proxy designed
669
+ for "web debugging."
670
+ * [Hale](https://github.com/pjlantz/Hale) - Botnet C&C monitor.
671
+ * [Haka](http://www.haka-security.org/) - An open source security oriented
672
+ language for describing protocols and applying security policies on (live)
673
+ captured traffic.
674
+ * [HTTPReplay](https://github.com/jbremer/httpreplay) - Library for parsing
675
+ and reading out PCAP files, including TLS streams using TLS Master Secrets
676
+ (used in Cuckoo Sandbox).
677
+ * [INetSim](http://www.inetsim.org/) - Network service emulation, useful when
678
+ building a malware lab.
679
+ * [Laika BOSS](https://github.com/lmco/laikaboss) - Laika BOSS is a file-centric
680
+ malware analysis and intrusion detection system.
681
+ * [Malcolm](https://github.com/idaholab/Malcolm) - Malcolm is a powerful, easily
682
+ deployable network traffic analysis tool suite for full packet capture artifacts
683
+ (PCAP files) and Zeek logs.
684
+ * [Malcom](https://github.com/tomchop/malcom) - Malware Communications
685
+ Analyzer.
686
+ * [Maltrail](https://github.com/stamparm/maltrail) - A malicious traffic
687
+ detection system, utilizing publicly available (black)lists containing
688
+ malicious and/or generally suspicious trails and featuring an reporting
689
+ and analysis interface.
690
+ * [mitmproxy](https://mitmproxy.org/) - Intercept network traffic on the fly.
691
+ * [Moloch](https://github.com/aol/moloch) - IPv4 traffic capturing, indexing
692
+ and database system.
693
+ * [NetworkMiner](http://www.netresec.com/?page=NetworkMiner) - Network
694
+ forensic analysis tool, with a free version.
695
+ * [ngrep](https://github.com/jpr5/ngrep) - Search through network traffic
696
+ like grep.
697
+ * [PcapViz](https://github.com/mateuszk87/PcapViz) - Network topology and
698
+ traffic visualizer.
699
+ * [Python ICAP Yara](https://github.com/RamadhanAmizudin/python-icap-yara) - An
700
+ ICAP Server with yara scanner for URL or content.
701
+ * [Squidmagic](https://github.com/ch3k1/squidmagic) - squidmagic is a tool
702
+ designed to analyze a web-based network traffic to detect central command
703
+ and control (C&C) servers and malicious sites, using Squid proxy server and
704
+ Spamhaus.
705
+ * [Tcpdump](http://www.tcpdump.org/) - Collect network traffic.
706
+ * [tcpick](http://tcpick.sourceforge.net/) - Trach and reassemble TCP streams
707
+ from network traffic.
708
+ * [tcpxtract](http://tcpxtract.sourceforge.net/) - Extract files from network
709
+ traffic.
710
+ * [Wireshark](https://www.wireshark.org/) - The network traffic analysis
711
+ tool.
712
+
713
+ ## Memory Forensics
714
+
715
+ *Tools for dissecting malware in memory images or running systems.*
716
+
717
+ * [BlackLight](https://www.blackbagtech.com/blacklight.html) - Windows/MacOS
718
+ forensics client supporting hiberfil, pagefile, raw memory analysis.
719
+ * [DAMM](https://github.com/504ensicsLabs/DAMM) - Differential Analysis of
720
+ Malware in Memory, built on Volatility.
721
+ * [evolve](https://github.com/JamesHabben/evolve) - Web interface for the
722
+ Volatility Memory Forensics Framework.
723
+ * [FindAES](https://sourceforge.net/projects/findaes/) - Find AES
724
+ encryption keys in memory.
725
+ * [inVtero.net](https://github.com/ShaneK2/inVtero.net) - High speed memory
726
+ analysis framework developed in .NET supports all Windows x64, includes
727
+ code integrity and write support.
728
+ * [Muninn](https://github.com/ytisf/muninn) - A script to automate portions
729
+ of analysis using Volatility, and create a readable report.
730
+ [Orochi](https://github.com/LDO-CERT/orochi) - Orochi is an open source framework for
731
+ collaborative forensic memory dump analysis.
732
+ * [Rekall](http://www.rekall-forensic.com/) - Memory analysis framework,
733
+ forked from Volatility in 2013.
734
+ * [TotalRecall](https://github.com/sketchymoose/TotalRecall) - Script based
735
+ on Volatility for automating various malware analysis tasks.
736
+ * [VolDiff](https://github.com/aim4r/VolDiff) - Run Volatility on memory
737
+ images before and after malware execution, and report changes.
738
+ * [Volatility](https://github.com/volatilityfoundation/volatility) - Advanced
739
+ memory forensics framework.
740
+ * [VolUtility](https://github.com/kevthehermit/VolUtility) - Web Interface for
741
+ Volatility Memory Analysis framework.
742
+ * [WDBGARK](https://github.com/swwwolf/wdbgark) -
743
+ WinDBG Anti-RootKit Extension.
744
+ * [WinDbg](https://developer.microsoft.com/en-us/windows/hardware/windows-driver-kit) -
745
+ Live memory inspection and kernel debugging for Windows systems.
746
+
747
+ ## Windows Artifacts
748
+
749
+ * [AChoir](https://github.com/OMENScan/AChoir) - A live incident response
750
+ script for gathering Windows artifacts.
751
+ * [python-evt](https://github.com/williballenthin/python-evt) - Python
752
+ library for parsing Windows Event Logs.
753
+ * [python-registry](http://www.williballenthin.com/registry/) - Python
754
+ library for parsing registry files.
755
+ * [RegRipper](http://brettshavers.cc/index.php/brettsblog/tags/tag/regripper/)
756
+ ([GitHub](https://github.com/keydet89/RegRipper2.8)) -
757
+ Plugin-based registry analysis tool.
758
+
759
+ ## Storage and Workflow
760
+
761
+ * [Aleph](https://github.com/merces/aleph) - Open Source Malware Analysis
762
+ Pipeline System.
763
+ * [CRITs](https://crits.github.io/) - Collaborative Research Into Threats, a
764
+ malware and threat repository.
765
+ * [FAME](https://certsocietegenerale.github.io/fame/) - A malware analysis
766
+ framework featuring a pipeline that can be extended with custom modules,
767
+ which can be chained and interact with each other to perform end-to-end
768
+ analysis.
769
+ * [Malwarehouse](https://github.com/sroberts/malwarehouse) - Store, tag, and
770
+ search malware.
771
+ * [Polichombr](https://github.com/ANSSI-FR/polichombr) - A malware analysis
772
+ platform designed to help analysts to reverse malwares collaboratively.
773
+ * [stoQ](http://stoq.punchcyber.com) - Distributed content analysis
774
+ framework with extensive plugin support, from input to output, and everything
775
+ in between.
776
+ * [Viper](http://viper.li/) - A binary management and analysis framework for
777
+ analysts and researchers.
778
+
779
+ ## Miscellaneous
780
+
781
+ * [al-khaser](https://github.com/LordNoteworthy/al-khaser) - A PoC malware
782
+ with good intentions that aimes to stress anti-malware systems.
783
+ * [CryptoKnight](https://github.com/AbertayMachineLearningGroup/CryptoKnight) - Automated cryptographic algorithm reverse engineering and classification framework.
784
+ * [DC3-MWCP](https://github.com/Defense-Cyber-Crime-Center/DC3-MWCP) -
785
+ The Defense Cyber Crime Center's Malware Configuration Parser framework.
786
+ * [FLARE VM](https://github.com/fireeye/flare-vm) - A fully customizable,
787
+ Windows-based, security distribution for malware analysis.
788
+ * [MalSploitBase](https://github.com/misterch0c/malSploitBase) - A database
789
+ containing exploits used by malware.
790
+ * [Malware Museum](https://archive.org/details/malwaremuseum) - Collection of
791
+ malware programs that were distributed in the 1980s and 1990s.
792
+ * [Malware Organiser](https://github.com/uppusaikiran/malware-organiser) - A simple tool to organise large malicious/benign files into a organised Structure.
793
+ * [Pafish](https://github.com/a0rtega/pafish) - Paranoid Fish, a demonstration
794
+ tool that employs several techniques to detect sandboxes and analysis
795
+ environments in the same way as malware families do.
796
+ * [REMnux](https://remnux.org/) - Linux distribution and docker images for
797
+ malware reverse engineering and analysis.
798
+ * [Tsurugi Linux](https://tsurugi-linux.org/) - Linux distribution designed to support your DFIR investigations, malware analysis and OSINT (Open Source INTelligence) activities.
799
+ * [Santoku Linux](https://santoku-linux.com/) - Linux distribution for mobile
800
+ forensics, malware analysis, and security.
801
+
802
+ # Resources
803
+
804
+ ## Books
805
+
806
+ *Essential malware analysis reading material.*
807
+
808
+ * [Learning Malware Analysis](https://www.packtpub.com/networking-and-servers/learning-malware-analysis) - Learning Malware Analysis: Explore the concepts, tools, and techniques to analuze and investigate Windows malware
809
+ * [Malware Analyst's Cookbook and DVD](https://amzn.com/dp/0470613033) -
810
+ Tools and Techniques for Fighting Malicious Code.
811
+ * [Mastering Malware Analysis](https://www.packtpub.com/networking-and-servers/mastering-malware-analysis) - Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercime, and IoT attacks
812
+ * [Mastering Reverse Engineering](https://www.packtpub.com/networking-and-servers/mastering-reverse-engineering) - Mastering Reverse Engineering: Re-engineer your ethical hacking skills
813
+ * [Practical Malware Analysis](https://amzn.com/dp/1593272901) - The Hands-On
814
+ Guide to Dissecting Malicious Software.
815
+ * [Practical Reverse Engineering](https://www.amzn.com/dp/1118787315/) -
816
+ Intermediate Reverse Engineering.
817
+ * [Real Digital Forensics](https://www.amzn.com/dp/0321240693) - Computer
818
+ Security and Incident Response.
819
+ * [Rootkits and Bootkits](https://www.amazon.com/dp/1593277164) - Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
820
+ * [The Art of Memory Forensics](https://amzn.com/dp/1118825098) - Detecting
821
+ Malware and Threats in Windows, Linux, and Mac Memory.
822
+ * [The IDA Pro Book](https://amzn.com/dp/1593272898) - The Unofficial Guide
823
+ to the World's Most Popular Disassembler.
824
+ * [The Rootkit Arsenal](https://amzn.com/dp/144962636X) - The Rootkit Arsenal:
825
+ Escape and Evasion in the Dark Corners of the System
826
+
827
+ ## Other
828
+
829
+ * [APT Notes](https://github.com/aptnotes/data) - A collection of papers
830
+ and notes related to Advanced Persistent Threats.
831
+ * [Ember](https://github.com/endgameinc/ember) - Endgame Malware BEnchmark for Research,
832
+ a repository that makes it easy to (re)create a machine learning model that can be used
833
+ to predict a score for a PE file based on static analysis.
834
+ * [File Formats posters](https://github.com/corkami/pics) - Nice visualization
835
+ of commonly used file format (including PE & ELF).
836
+ * [Honeynet Project](http://honeynet.org/) - Honeypot tools, papers, and
837
+ other resources.
838
+ * [Kernel Mode](http://www.kernelmode.info/forum/) - An active community
839
+ devoted to malware analysis and kernel development.
840
+ * [Malicious Software](https://zeltser.com/malicious-software/) - Malware
841
+ blog and resources by Lenny Zeltser.
842
+ * [Malware Analysis Search](https://cse.google.com/cse/home?cx=011750002002865445766%3Apc60zx1rliu) -
843
+ Custom Google search engine from [Corey Harrell](journeyintoir.blogspot.com/).
844
+ * [Malware Analysis Tutorials](http://fumalwareanalysis.blogspot.nl/p/malware-analysis-tutorials-reverse.html) -
845
+ The Malware Analysis Tutorials by Dr. Xiang Fu, a great resource for learning
846
+ practical malware analysis.
847
+ * [Malware Analysis, Threat Intelligence and Reverse Engineering](https://www.slideshare.net/bartblaze/malware-analysis-threat-intelligence-and-reverse-engineering) -
848
+ Presentation introducing the concepts of malware analysis, threat intelligence
849
+ and reverse engineering. Experience or prior knowledge is not required. Labs
850
+ link in description.
851
+ * [Malware Persistence](https://github.com/Karneades/malware-persistence) - Collection
852
+ of various information focused on malware persistence: detection (techniques),
853
+ response, pitfalls and the log collection (tools).
854
+ * [Malware Samples and Traffic](http://malware-traffic-analysis.net/) - This
855
+ blog focuses on network traffic related to malware infections.
856
+ * [Malware Search+++](https://addons.mozilla.org/fr/firefox/addon/malware-search-plusplusplus/) Firefox extension allows
857
+ you to easily search some of the most popular malware databases
858
+ * [Practical Malware Analysis Starter Kit](https://bluesoul.me/practical-malware-analysis-starter-kit/) -
859
+ This package contains most of the software referenced in the Practical Malware
860
+ Analysis book.
861
+ * [RPISEC Malware Analysis](https://github.com/RPISEC/Malware) - These are the
862
+ course materials used in the Malware Analysis course at at Rensselaer Polytechnic
863
+ Institute during Fall 2015.
864
+ * [WindowsIR: Malware](http://windowsir.blogspot.com/p/malware.html) - Harlan
865
+ Carvey's page on Malware.
866
+ * [Windows Registry specification](https://github.com/msuhanov/regf/blob/master/Windows%20registry%20file%20format%20specification.md) -
867
+ Windows registry file format specification.
868
+ * [/r/csirt_tools](https://www.reddit.com/r/csirt_tools/) - Subreddit for CSIRT
869
+ tools and resources, with a
870
+ [malware analysis](https://www.reddit.com/r/csirt_tools/search?q=flair%3A%22Malware%20analysis%22&sort=new&restrict_sr=on) flair.
871
+ * [/r/Malware](https://www.reddit.com/r/Malware) - The malware subreddit.
872
+ * [/r/ReverseEngineering](https://www.reddit.com/r/ReverseEngineering) -
873
+ Reverse engineering subreddit, not limited to just malware.
874
+
875
+
876
+
877
+ # Related Awesome Lists
878
+
879
+ * [Android Security](https://github.com/ashishb/android-security-awesome)
880
+ * [AppSec](https://github.com/paragonie/awesome-appsec)
881
+ * [CTFs](https://github.com/apsdehal/awesome-ctf)
882
+ * [Executable Packing](https://github.com/dhondta/awesome-executable-packing)
883
+ * [Forensics](https://github.com/Cugu/awesome-forensics)
884
+ * ["Hacking"](https://github.com/carpedm20/awesome-hacking)
885
+ * [Honeypots](https://github.com/paralax/awesome-honeypots)
886
+ * [Industrial Control System Security](https://github.com/hslatman/awesome-industrial-control-system-security)
887
+ * [Incident-Response](https://github.com/meirwah/awesome-incident-response)
888
+ * [Infosec](https://github.com/onlurking/awesome-infosec)
889
+ * [PCAP Tools](https://github.com/caesar0301/awesome-pcaptools)
890
+ * [Pentesting](https://github.com/enaqx/awesome-pentest)
891
+ * [Security](https://github.com/sbilly/awesome-security)
892
+ * [Threat Intelligence](https://github.com/hslatman/awesome-threat-intelligence)
893
+ * [YARA](https://github.com/InQuest/awesome-yara)
894
+
895
+ # [Contributing](CONTRIBUTING.md)
896
+
897
+ Pull requests and issues with suggestions are welcome! Please read the
898
+ [CONTRIBUTING](CONTRIBUTING.md) guidelines before submitting a PR.
899
+
900
+ # Thanks
901
+
902
+ This list was made possible by:
903
+
904
+ * Lenny Zeltser and other contributors for developing REMnux, where I
905
+ found many of the tools in this list;
906
+ * Michail Hale Ligh, Steven Adair, Blake Hartstein, and Mather Richard for
907
+ writing the *Malware Analyst's Cookbook*, which was a big inspiration for
908
+ creating the list;
909
+ * And everyone else who has sent pull requests or suggested links to add here!
910
+
911
+ Thanks!
malware_detection/malware_detection_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
malware_detection/metadata.json ADDED
@@ -0,0 +1,17 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "dataset_id": "malware_detection",
3
+ "processed_at": "2025-08-24T04:08:53.227069",
4
+ "samples": 10000,
5
+ "features": [
6
+ "file_hash",
7
+ "file_size",
8
+ "entropy",
9
+ "pe_sections",
10
+ "imports",
11
+ "exports",
12
+ "strings_count",
13
+ "is_malware"
14
+ ],
15
+ "type": "malware",
16
+ "file_path": "..\\datasets\\malware_detection\\malware_detection_processed.csv"
17
+ }