Shinigami
Malware detector
An experimental tool designed to detect and unpack malware implants injected via process hollowing or generic packer routines.
A dynamic unpacking tool
129 stars
4 watching
11 forks
Language: C++
last commit: over 1 year ago malware-analysismalware-detectionmalware-researchprocess-injectionreverse-engineeringwindows
Related projects:
Repository | Description | Stars |
---|---|---|
johnnykv/heralding | A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 377 |
rieck/malheur | A tool for automatically analyzing malware behavior and identifying patterns and classes. | 369 |
cyb3rmx/qu1cksc0pe | An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. | 1,348 |
d4stiny/peacemaker | A Windows kernel-mode utility designed to detect and analyze advanced malware techniques. | 417 |
telekom-security/malware_analysis | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
rfxn/linux-malware-detect | A tool designed to improve malware detection on Linux systems | 1,207 |
cylance/pypackerdetect | An executable detection tool using PE parsing and machine learning signatures to identify packed samples. | 30 |
cristianzsh/freki | A platform for analyzing malware and performing reverse engineering on binary files | 424 |
nbeede/boombox | A tool for creating and deploying a virtual malware analysis environment using Cuckoo Sandbox and Windows 10. | 235 |
advanced-threat-research/dotdumper | An automated tool for analyzing .NET-based malware samples by logging function calls and dumping memory segments. | 250 |
malwaremusings/unpacker | Automated malware analysis tool | 118 |
zhengmin1989/droidanalytics | An Android malware analysis system designed to collect and analyze malware signatures using machine learning techniques. | 29 |
joxeankoret/pyew | A command-line tool for analyzing malware and disassembling binary files | 386 |
carbonblack/binee | A binary emulation environment that introspects system interactions to analyze malware behavior. | 507 |
dragokas/hijackthis | Scans for and identifies malicious system modifications | 704 |