- Bordeaux
Highlights
🛰️ Malware
Portable Executable reversing tool with a friendly GUI
Quick analysis focusing on most important of a Malware or a Threat
The essential toolkit for reversing, malware analysis, and cracking
Free and Open Source Reverse Engineering Platform powered by rizin
Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles
The FLARE team's open-source tool to identify capabilities in executable files.
A True Instrumentable Binary Emulation Framework
Malware similarity platform with modularity in mind.
Cairo/Starknet security toolkit (bytecode analyzer, disassembler, decompiler, symbolic execution, SBMC)
YARA rule analyzer to improve rule quality and performance
Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cybercrime tracker and c2 for Pony.
[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods…
A GUI and CLI tool for removing bloat from executables
Malware samples, analysis exercises and other interesting resources.
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
arm_now is a qemu powered tool that allows instant setup of virtual machines on arm cpu, mips, powerpc, nios2, x86 and more, for reverse, exploit, fuzzing and programming purpose.
a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker conta…
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
AssemblyLine 4: File triage and malware analysis
An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).