mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-12-24 05:05:25 +00:00
Merge pull request #131 from rshipp/hslatman-patch-3
Add Assemblyline by CSE
This commit is contained in:
commit
fb5cf0d82e
10
README.md
10
README.md
@ -194,6 +194,8 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
|||||||
|
|
||||||
* [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Wrapper for a
|
* [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Wrapper for a
|
||||||
variety of tools for reporting on Windows PE files.
|
variety of tools for reporting on Windows PE files.
|
||||||
|
* [Assemblyline](https://bitbucket.org/cse-assemblyline/assemblyline) - A scalable
|
||||||
|
distributed file analysis framework.
|
||||||
* [BinaryAlert](https://github.com/airbnb/binaryalert) - An open source, serverless
|
* [BinaryAlert](https://github.com/airbnb/binaryalert) - An open source, serverless
|
||||||
AWS pipeline that scans and alerts on uploaded files based on a set of
|
AWS pipeline that scans and alerts on uploaded files based on a set of
|
||||||
YARA rules.
|
YARA rules.
|
||||||
@ -520,13 +522,13 @@ the [browser malware](#browser-malware) section.*
|
|||||||
* [PPEE (puppy)](https://www.mzrst.com/) - A Professional PE file Explorer for
|
* [PPEE (puppy)](https://www.mzrst.com/) - A Professional PE file Explorer for
|
||||||
reversers, malware researchers and those who want to statically inspect PE
|
reversers, malware researchers and those who want to statically inspect PE
|
||||||
files in more detail.
|
files in more detail.
|
||||||
* [Process Explorer](https://docs.microsoft.com/sysinternals/downloads/process-explorer) -
|
* [Process Explorer](https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer) -
|
||||||
Advanced task manager for Windows.
|
Advanced task manager for Windows.
|
||||||
* [Process Hacker](http://processhacker.sourceforge.net/) - Tool that monitors
|
* [Process Hacker](http://processhacker.sourceforge.net/) - Tool that monitors
|
||||||
system resources.
|
system resources.
|
||||||
* [Process Monitor](https://docs.microsoft.com/sysinternals/downloads/procmon) -
|
* [Process Monitor](https://docs.microsoft.com/en-us/sysinternals/downloads/procmon) -
|
||||||
Advanced monitoring tool for Windows programs.
|
Advanced monitoring tool for Windows programs.
|
||||||
* [PSTools](https://docs.microsoft.com/sysinternals/downloads/pstools) - Windows
|
* [PSTools](https://docs.microsoft.com/en-us/sysinternals/downloads/pstools) - Windows
|
||||||
command-line tools that help manage and investigate live systems.
|
command-line tools that help manage and investigate live systems.
|
||||||
* [Pyew](https://github.com/joxeankoret/pyew) - Python tool for malware
|
* [Pyew](https://github.com/joxeankoret/pyew) - Python tool for malware
|
||||||
analysis.
|
analysis.
|
||||||
@ -568,7 +570,7 @@ the [browser malware](#browser-malware) section.*
|
|||||||
decoding framework.
|
decoding framework.
|
||||||
* [CloudShark](https://www.cloudshark.org) - Web-based tool for packet analysis
|
* [CloudShark](https://www.cloudshark.org) - Web-based tool for packet analysis
|
||||||
and malware traffic detection.
|
and malware traffic detection.
|
||||||
* [Fiddler](http://www.telerik.com/fiddler) - Intercepting web proxy designed
|
* [Fiddler](https://www.telerik.com/fiddler) - Intercepting web proxy designed
|
||||||
for "web debugging."
|
for "web debugging."
|
||||||
* [Hale](https://github.com/pjlantz/Hale) - Botnet C&C monitor.
|
* [Hale](https://github.com/pjlantz/Hale) - Botnet C&C monitor.
|
||||||
* [Haka](http://www.haka-security.org/) - An open source security oriented
|
* [Haka](http://www.haka-security.org/) - An open source security oriented
|
||||||
|
Loading…
Reference in New Issue
Block a user