Malfunction

Malware analyzer

Tools for analyzing and comparing malware at a function level using fuzzy hashing algorithms

Malware Analysis Tool using Function Level Fuzzy Hashing

GitHub

192 stars
26 watching
35 forks
Language: Python
last commit: about 9 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
idiom/pftriage Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. 77
cristianzsh/freki A platform for analyzing malware and performing reverse engineering on binary files 424
zhengmin1989/droidanalytics An Android malware analysis system designed to collect and analyze malware signatures using machine learning techniques. 29
maldroid/maldrolyzer A framework to analyze and extract data from Android malware, providing actionable information about malicious code. 102
udcide/udcide Tool for analyzing and modifying Android malware behaviors to aid in security analysis and investigation 34
tomchop/malcom Analyzes network traffic to detect malware communication and behavior 1,158
detuxsandbox/detux Analyzes and captures malware traffic on Linux sandboxed environments using QEMU hypervisor and various CPU architectures. 261
diogo-fernan/malsub A Python framework that provides an API interface to multiple online services for analyzing malware and threat intelligence 368
rieck/malheur A tool for automatically analyzing malware behavior and identifying patterns and classes. 369
cyb3rmx/qu1cksc0pe An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. 1,348
accidentalrebel/mbcscan Analyzes malware behavior and maps it to a Malware Behavior Catalog for better understanding 20
malwaremusings/unpacker Automated malware analysis tool 118
telekom-security/malware_analysis An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. 110
mrphrazer/hitb2021ams_deobfuscation Automated deobfuscation of malware code using symbolic execution and simplification techniques 72