Shinigami
Malware detector
An experimental tool designed to detect and unpack malware implants injected via process hollowing or generic packer routines.
A dynamic unpacking tool
128 stars
4 watching
11 forks
Language: C++
last commit: about 1 year ago malware-analysismalware-detectionmalware-researchprocess-injectionreverse-engineeringwindows
Related projects:
Repository | Description | Stars |
---|---|---|
johnnykv/heralding | A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 376 |
rieck/malheur | A tool for automatically analyzing malware behavior and identifying patterns and classes. | 368 |
cyb3rmx/qu1cksc0pe | A comprehensive tool for analyzing suspicious files and detecting malware characteristics. | 1,320 |
d4stiny/peacemaker | A Windows kernel-mode utility designed to detect and analyze advanced malware techniques. | 417 |
telekom-security/malware_analysis | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
rfxn/linux-malware-detect | A Linux malware detection system using threat data from various sources to generate signatures for detection | 1,201 |
cylance/pypackerdetect | An executable detection tool using PE parsing and machine learning signatures to identify packed samples. | 29 |
cristianzsh/freki | A platform for analyzing malware and performing reverse engineering on binary files | 422 |
nbeede/boombox | A tool for creating and deploying a virtual malware analysis environment using Cuckoo Sandbox and Windows 10. | 234 |
advanced-threat-research/dotdumper | An automated tool for analyzing .NET-based malware samples by logging function calls and dumping memory segments. | 249 |
malwaremusings/unpacker | Automated malware analysis tool | 118 |
zhengmin1989/droidanalytics | An Android malware analysis system designed to collect and analyze malware signatures using machine learning techniques. | 29 |
joxeankoret/pyew | A command-line tool for analyzing malware and disassembling binary files | 383 |
carbonblack/binee | A binary emulation environment that introspects system interactions to analyze malware behavior. | 503 |
dragokas/hijackthis | Scans for and identifies malicious system modifications | 699 |