Shinigami
Malware detector
An experimental tool designed to detect and unpack malware implants injected via process hollowing or generic packer routines.
A dynamic unpacking tool
129 stars
4 watching
11 forks
Language: C++
last commit: over 1 year ago malware-analysismalware-detectionmalware-researchprocess-injectionreverse-engineeringwindows
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 377 |
| A tool for automatically analyzing malware behavior and identifying patterns and classes. | 369 |
| An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. | 1,348 |
| A Windows kernel-mode utility designed to detect and analyze advanced malware techniques. | 417 |
| An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
| A malware scanner designed to detect specific types of malware in Linux systems | 1,210 |
| An executable detection tool using PE parsing and machine learning signatures to identify packed samples. | 30 |
| A platform for analyzing malware and performing reverse engineering on binary files | 424 |
| A tool for creating and deploying a virtual malware analysis environment using Cuckoo Sandbox and Windows 10. | 235 |
| An automated tool for analyzing .NET-based malware samples by logging function calls and dumping memory segments. | 250 |
| Automated malware analysis tool | 118 |
| An Android malware analysis system designed to collect and analyze malware signatures using machine learning techniques. | 29 |
| A command-line tool for analyzing malware and disassembling binary files | 386 |
| A binary emulation environment that introspects system interactions to analyze malware behavior. | 507 |
| Scans for and identifies malicious system modifications | 704 |