flare-capa
The FLARE team's open-source tool to identify capabilities in executable files.
elf-static-toolkit
ELF Static Toolkit | Executable and Linkable Format (ELF) Analysing Toolkit
pe-static-toolkit
PE Static Toolkit | Portable Executable (PE) Analysing Toolkit
apk-static-toolkit
APK Static Toolkit | Android Package Kit (APK) Analysing Toolkit
androidmalwarecrypto
The analysis of cryptography in Android malicious applications
cape-hook-generator
CAPEv2 (capemon) hook skeleton generator (hookdefs) for your malware analysis needs.
docker-packing-box
Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detection
gview
GView is a cross-platform framework for reverse-engineering. Users can leverage the diverse range of available visualization options to effectively analyze and interpret the information.
hexa_payload_decoder
A tool to automatically decode and translate any TCP hexa payload data form any language to english.
capemon-hook-generator
CAPEv2 (capemon) hook skeleton generator (hookdefs) for your malware analysis needs.
malgraphiq
Transform your malware sandbox reports and execution traces into behavior and category graphs and plot their Windows Behavior Catalog (WBC) behavior identification.
https://github.com/csvl/sema
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
https://github.com/czs108/microsoft-malware-classification
🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Windows PE structures, disassembly scripts and machine code.
bayesian-hyper-parameter-optimization-for-malware-detection
AI-CyberSec 2021 Workshop CEUR Publication(AI-2021 Forty-first SGAI International Conference)
misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform