AskJOE
Malware decoder
A tool that utilizes OpenAI to assist researchers in reverse engineering malware using Ghidra
This is a Ghidra script that calls OPENAI to give meaning to decompiled functions
121 stars
5 watching
8 forks
Language: Python
last commit: 7 months ago automationghidraopenaipluginreversing
Related projects:
Repository | Description | Stars |
---|---|---|
| A set of Ghidra scripts for analyzing malware and extracting insights from shellcodes using various techniques such as hash matching and deobfuscation. | 91 |
| A tool for decompressing malware samples and running Yara rules against them. | 7 |
| Tools to detect and analyze malware using Yara rules | 2 |
| A command-line tool for analyzing malware and disassembling binary files | 386 |
| A web service for scanning files with Yara rules to detect malware and other threats | 27 |
| Analyzes malware files to detect suspicious behavior by extracting meta information and features. | 1 |
| An IDA plugin for creating and analyzing function call graphs of malware | 328 |
| A web browser extension that intercepts and analyzes script requests to detect malware using YARA rules | 48 |
| An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. | 1,348 |
| A collection of tools and scripts for analyzing malware, reverse engineering malware, and decrypting encrypted data | 455 |
| Provides an API wrapper to interact with the Joe Sandbox API for analyzing malicious files. | 64 |
| Analyzes running processes to detect and dump malicious code | 2,047 |
| A plugin that enables malware analysis using the YARA ruleset | 30 |
| An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
| An enhancement tool for Ghidra's binary analysis capabilities | 289 |