Category: Malware Analysis

Binary instrumentation framework

medusa: automates processes and techniques practised

medusa Medusa is an extensible framework for Android applications which automates processes and techniques practised during the dynamic analysis of a malware investigation. Some of the framework’s features are the following: Tracing and instrumentation of API calls used by...

telfhash

telfhash: Hunting IoT elves

Trend Micro ELF Hash (telfhash) telfhash is a symbol hash for ELF files, just like imphash is imports hash for PE files. Telfhash is an architecture-agnostic hash based on symbols of ELF files. It...

Uchihash

Uchihash: deal with malware embedded hashes

Uchihash Uchihash is a small utility that can save malware analysts the time of dealing with embedded hash values used for various things such as: Dynamically importing APIs (especially in shellcode) Checking running process...

create YARA rules

halogen: create YARA rules from malicious documents

Halogen Halogen is a tool to automate the creation of yara rules against image files embedded within a malicious document. Download git clone https://github.com/target/halogen.git Use   Testing it out We’ve included some test document...

Malware analysis platform

freki: Malware analysis platform

freki Freki is a free and open-source malware analysis platform. Goals Facilitate malware analysis and reverse engineering; Provide an easy-to-use REST API for different projects; Easy deployment (via Docker); Allow the addition of new...

ShowStopper 

ShowStopper: Anti-Debug tricks exploration tool

ShowStopper – Anti-Debug tricks exploration tool The ShowStopper project is a tool to help malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods. With this...