Shinigami

Malware detector

An experimental tool designed to detect and unpack malware implants injected via process hollowing or generic packer routines.

A dynamic unpacking tool

GitHub

128 stars
4 watching
11 forks
Language: C++
last commit: about 1 year ago
malware-analysismalware-detectionmalware-researchprocess-injectionreverse-engineeringwindows

Related projects:

Repository Description Stars
johnnykv/heralding A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services 376
rieck/malheur A tool for automatically analyzing malware behavior and identifying patterns and classes. 368
cyb3rmx/qu1cksc0pe A comprehensive tool for analyzing suspicious files and detecting malware characteristics. 1,320
d4stiny/peacemaker A Windows kernel-mode utility designed to detect and analyze advanced malware techniques. 417
telekom-security/malware_analysis An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. 110
rfxn/linux-malware-detect A Linux malware detection system using threat data from various sources to generate signatures for detection 1,201
cylance/pypackerdetect An executable detection tool using PE parsing and machine learning signatures to identify packed samples. 29
cristianzsh/freki A platform for analyzing malware and performing reverse engineering on binary files 422
nbeede/boombox A tool for creating and deploying a virtual malware analysis environment using Cuckoo Sandbox and Windows 10. 234
advanced-threat-research/dotdumper An automated tool for analyzing .NET-based malware samples by logging function calls and dumping memory segments. 249
malwaremusings/unpacker Automated malware analysis tool 118
zhengmin1989/droidanalytics An Android malware analysis system designed to collect and analyze malware signatures using machine learning techniques. 29
joxeankoret/pyew A command-line tool for analyzing malware and disassembling binary files 383
carbonblack/binee A binary emulation environment that introspects system interactions to analyze malware behavior. 503
dragokas/hijackthis Scans for and identifies malicious system modifications 699