-
SECUINFRA Falcon Team
- https://dissectingmalwa.re
- @f0wlsec
Stars
Library for lifting machine code to LLVM bitcode
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
Operational Technology related Yara rules for the 2024 #100daysofYARA challenge. #OT #ICS #SCADA
Rules shared by the community from 100 Days of YARA 2024
This Zeek package provides the possibility to detect exfiltration through statistical analysis methods.
A ProcessMonitor visualization application written in rust.
JADX-gui scripting plugin for dynamic decompiler manipulation
Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.
Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results
User-friendly Microsoft Windows Debugger for Malware Analysts.
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative featur…
Rapidly Search and Hunt through Windows Forensic Artefacts