irma
File analyzer
An asynchronous analysis system for suspicious files
IRMA is an asynchronous & customizable analysis system for suspicious files.
268 stars
52 watching
55 forks
Language: JavaScript
last commit: almost 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Detects and analyzes command injection vulnerabilities in iRules written in the Tool Command Language (Tcl), allowing for identification of potential security flaws. | 5 |
| Analyzes files to detect malware and extract embedded content | 49 |
| Helps Threat Intelligence researchers hunt for new malware by efficiently scanning large collections of files with Yara rules | 698 |
| A YARA-based library to analyze files and archives for potential maliciousness | 2 |
| An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. | 1,348 |
| Automates malware analysis workflow by extracting features and indicators of compromise from malicious files using various tools and libraries. | 16 |
| A collection of tools and scripts for analyzing malware, reverse engineering malware, and decrypting encrypted data | 455 |
| A C# wrapper around the Yara pattern matching library for detecting malware and analyzing binaries | 36 |
| A tool for decompressing malware samples and running Yara rules against them. | 7 |
| Analyzes Sysmon event logs to detect suspicious activity and visualize process and network correlations. | 419 |
| A tool that analyzes source code in real-time to detect potential security vulnerabilities and displays warnings as the developer writes code. | 448 |
| Analyzes malware by extracting and comparing system call dependencies to classify and detect malicious behavior | 101 |
| An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
| A platform for analyzing malware and performing reverse engineering on binary files | 424 |
| Analyze Android app malice and detect malicious behaviors | 485 |