Updated 6 months ago

flare-capa • Rank 22.3 • Science 54%

The FLARE team's open-source tool to identify capabilities in executable files.

Updated 6 months ago

docker-packing-box • Science 54%

Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detection

Updated 6 months ago

malgraphiq • Science 39%

Transform your malware sandbox reports and execution traces into behavior and category graphs and plot their Windows Behavior Catalog (WBC) behavior identification.

Updated 5 months ago

https://github.com/czs108/microsoft-malware-classification • Science 10%

🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Windows PE structures, disassembly scripts and machine code.

Updated 6 months ago

gview • Science 44%

GView is a cross-platform framework for reverse-engineering. Users can leverage the diverse range of available visualization options to effectively analyze and interpret the information.

Updated 6 months ago

hexa_payload_decoder • Science 44%

A tool to automatically decode and translate any TCP hexa payload data form any language to english.

Updated 5 months ago

https://github.com/csvl/sema • Science 26%

SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.

Updated 6 months ago

cape-hook-generator • Science 44%

CAPEv2 (capemon) hook skeleton generator (hookdefs) for your malware analysis needs.

Updated 6 months ago

androidmalwarecrypto • Science 28%

The analysis of cryptography in Android malicious applications