CTO
Malware analyzer
An IDA plugin for creating and analyzing function call graphs of malware
Call Tree Overviewer
324 stars
12 watching
37 forks
Language: Python
last commit: about 2 months ago Related projects:
Repository | Description | Stars |
---|---|---|
telekom-security/malware_analysis | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
virustotal/vt-ida-plugin | An IDA Pro plugin that searches for similar code, strings, or sequences of bytes using VirusTotal's web services. | 155 |
cristianzsh/freki | A platform for analyzing malware and performing reverse engineering on binary files | 422 |
securityjoes/askjoe | An OpenAI-powered Ghidra script to analyze malware by providing explanations and insights | 121 |
oalabs/hashdb-ida | A plugin for IDA Pro that connects to an external hash lookup service to identify strings hashed in malware. | 296 |
dragokas/hijackthis | Scans for and identifies malicious system modifications | 699 |
malwarecantfly/vba2graph | Analyzes VBA code to generate visual call graphs and highlights potential malicious keywords | 274 |
pwcuk-cto/rtfsig | Analyzes RTF documents to identify potentially unique parts | 29 |
ke0z/vulchatgpt | An IDA PRO plugin to analyze binaries for potential vulnerabilities using AI-powered decompilation and static analysis | 352 |
jpcertcc/aa-tools | A collection of tools and scripts for analyzing malware, reverse engineering malware, and decrypting encrypted data | 455 |
idanr1986/cuckoo-droid | Automated Android malware analysis tool | 580 |
uppusaikiran/generic-parser | Analyzes malware files to detect suspicious behavior by extracting meta information and features. | 1 |
patois/hrdevhelper | A plugin for visualizing decompiled code and its corresponding ctree graphs in the Hexrays decompiler. | 375 |
zhengmin1989/droidanalytics | An Android malware analysis system designed to collect and analyze malware signatures using machine learning techniques. | 29 |
cyb3rmx/qu1cksc0pe | A comprehensive tool for analyzing suspicious files and detecting malware characteristics. | 1,320 |