Category: Malware Analysis

moneta

moneta: live usermode memory analysis tool

Moneta Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs. With fileless malware becoming ubiquitous in the Red Teaming world, dynamic code is a feature of...

Kraken

kraken: cross-platform Yara scanner

kraken Kraken is a simple cross-platform Yara scanner that can be built for Windows, Mac, FreeBSD, and Linux. It is primarily intended for incident response, research, and ad-hoc detections (not for endpoint protection). Following are...

Yara Generator

VT Code Similarity Yara Generator

VT Code Similarity Yara Generator Yara rule generator using VirusTotal code similarity feature code-similar-to: This Yara generator is using VirusTotal ‘code-similar-to:’ beta search modifier to gather code blocks from PE files and automatically create a...

Volatility 3 Explorer

Vol3xp: Volatility Explorer Suit

Vol3xp, Volatility 3 Explorer Plugins RAMMap -> Physical Address Mapping (pfn.py) RAMMap (very similar to Rammap [SysInternals]), but additionally it marks any suspicious pages (for more information read the pdf). This module contains 3...

Hfinger

Hfinger: fingerprinting HTTP requests

Hfinger – fingerprinting HTTP requests Tool for fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage 🙂 Its main objective is to provide a representation of malware requests...

replica

replica: Ghidra Analysis Enhancer

replica Ghidra Analysis Enhancer ✨Features ⚡ Disassemble missed instructions – Define code that Ghidra’s auto analysis missed ⚡ Detect and fix missed functions – Define functions that Ghidra’s auto analysis missed ⚡ Fix ‘undefinedN’ datatypes – Enhance...

xioc

xioc: Extract indicators of compromise from text

xioc Extract indicators of compromise from the text, including “escaped” ones like hxxp://banana.com, 1.1.1[.]1, and phish at malicious dot com. Features Extract IOCs (indicators of compromise) from an input text: IPv4 IPv6 Domain URL...

IOC scanner

spyre v1.2.5 releases: simple YARA-based IOC scanner

Spyre Spyre is a simple host-based IOC scanner built around the YARA pattern matching engine and other scan modules. The main goal of this project is the easy operationalization of YARA rules and other indicators of...