Awesome Malware Analysis
      
    
    
      A curated list of awesome malware analysis tools and resources. Inspired
      by
      awesome-python and
      awesome-php.
    
    
      
    
    
    
      View Chinese translation:
      恶意软件分析大合集.md.
    
    
    Malware Collection
    Anonymizers
    Web traffic anonymizers for analysts.
    
      - 
        Anonymouse.org - A free, web based
        anonymizer.
      
 
      - 
        OpenVPN - VPN software and hosting
        solutions.
      
 
      - 
        Privoxy - An open source proxy
        server with some privacy features.
      
 
      - 
        Tor - The Onion Router, for
        browsing the web without leaving traces of the client IP.
      
 
    
    Honeypots
    Trap and collect your own samples.
    
      - 
        Conpot - ICS/SCADA
        honeypot.
      
 
      - 
        Cowrie - SSH
        honeypot, based on Kippo.
      
 
      - 
        DemoHunter -
        Low interaction Distributed Honeypots.
      
 
      - 
        Dionaea - Honeypot
        designed to trap malware.
      
 
      - 
        Glastopf - Web
        application honeypot.
      
 
      - 
        Honeyd - Create a virtual honeynet.
      
 
      - 
        HoneyDrive - Honeypot
        bundle Linux distro.
      
 
      - 
        Honeytrap -
        Opensource system for running, monitoring and managing honeypots.
      
 
      - 
        MHN - MHN is a
        centralized server for management and data collection of honeypots. MHN
        allows you to deploy sensors quickly and to collect data immediately,
        viewable from a neat web interface.
      
 
      - 
        Mnemosyne - A
        normalizer for honeypot data; supports Dionaea.
      
 
      - 
        Thug - Low interaction
        honeyclient, for investigating malicious websites.
      
 
    
    Malware Corpora
    Malware samples collected for analysis.
    
      - 
        Clean MX -
        Realtime database of malware and malicious domains.
      
 
      - 
        Contagio - A collection
        of recent malware samples and analyses.
      
 
      - 
        Exploit Database - Exploit and
        shellcode samples.
      
 
      - 
        Infosec - CERT-PA
        - Malware samples collection and analysis.
      
 
      - 
        InQuest Labs - Evergrowing
        searchable corpus of malicious Microsoft documents.
      
 
      - 
        Javascript Mallware Collection
        - Collection of almost 40.000 javascript malware samples
      
 
      - 
        Malpedia - A
        resource providing rapid identification and actionable context for
        malware investigations.
      
 
      - 
        Malshare - Large repository of
        malware actively scrapped from malicious sites.
      
 
      - 
        Open Malware Project - Sample
        information and downloads. Formerly Offensive Computing.
      
 
      - 
        Ragpicker - Plugin
        based malware crawler with pre-analysis and reporting functionalities
      
 
      - 
        theZoo - Live malware
        samples for analysts.
      
 
      - 
        Tracker h3x - Agregator for malware
        corpus tracker and malicious download sites.
      
 
      - 
        vduddu malware repo -
        Collection of various malware files and source code.
      
 
      - 
        VirusBay - Community-Based
        malware repository and social network.
      
 
      - 
        ViruSign - Malware database that
        detected by many anti malware programs except ClamAV.
      
 
      - 
        VirusShare - Malware repository,
        registration required.
      
 
      - 
        VX Vault - Active collection of malware
        samples.
      
 
      - 
        Zeltser’s Sources
        - A list of malware sample sources put together by Lenny Zeltser.
      
 
      - 
        Zeus Source Code - Source
        for the Zeus trojan leaked in 2011.
      
 
      - 
        VX Underground - Massive and
        growing collection of free malware samples.
      
 
    
    
      Open Source Threat Intelligence
    
    
    Harvest and analyze IOCs.
    
      - 
        AbuseHelper - An
        open-source framework for receiving and redistributing abuse feeds and
        threat intel.
      
 
      - 
        AlienVault Open Threat Exchange
        - Share and collaborate in developing Threat Intelligence.
      
 
      - 
        Combine - Tool to
        gather Threat Intelligence indicators from publicly available sources.
      
 
      - 
        Fileintel - Pull
        intelligence per file hash.
      
 
      - 
        Hostintel - Pull
        intelligence per host.
      
 
      - 
        IntelMQ
        - A tool for CERTs for processing incident data using a message queue.
      
 
      - 
        IOC Editor
        - A free editor for XML IOC files.
      
 
      - 
        iocextract -
        Advanced Indicator of Compromise (IOC) extractor, Python library and
        command-line tool.
      
 
      - 
        ioc_writer - Python
        library for working with OpenIOC objects, from Mandiant.
      
 
      - 
        MalPipe -
        Malware/IOC ingestion and processing engine, that enriches collected
        data.
      
 
      - 
        Massive Octo Spice
        - Previously known as CIF (Collective Intelligence Framework).
        Aggregates IOCs from various lists. Curated by the
        CSIRT Gadgets Foundation.
      
 
      - 
        MISP - Malware Information
        Sharing Platform curated by
        The MISP Project.
      
 
      - 
        Pulsedive - Free, community-driven
        threat intelligence platform collecting IOCs from open-source feeds.
      
 
      - 
        PyIOCe - A Python OpenIOC
        editor.
      
 
      - 
        RiskIQ - Research, connect,
        tag and share IPs and domains. (Was PassiveTotal.)
      
 
      - 
        threataggregator
        - Aggregates security threats from a number of sources, including some
        of those listed below in other resources.
      
 
      - 
        ThreatConnect - TC Open
        allows you to see and share open source threat data, with support and
        validation from our free community.
      
 
      - 
        ThreatCrowd - A search engine
        for threats, with graphical visualization.
      
 
      - 
        ThreatIngestor
        - Build automated threat intel pipelines sourcing from Twitter, RSS,
        GitHub, and more.
      
 
      - 
        ThreatTracker
        - A Python script to monitor and generate alerts based on IOCs indexed
        by a set of Google Custom Search Engines.
      
 
      - 
        TIQ-test - Data
        visualization and statistical analysis of Threat Intelligence feeds.
      
 
    
    Other Resources
    Threat intelligence and IOC resources.
    
      - 
        Autoshun (list) - Snort plugin and blocklist.
      
 
      - 
        Bambenek Consulting Feeds
        - OSINT feeds based on malicious DGA algorithms.
      
 
      - 
        Fidelis Barncat
        - Extensive malware config database (must request access).
      
 
      - 
        CI Army (list) - Network security blocklists.
      
 
      - 
        Critical Stack- Free Intel Market
        - Free intel aggregator with deduplication featuring 90+ feeds and over
        1.2M indicators.
      
 
      - 
        Cybercrime tracker -
        Multiple botnet active tracker.
      
 
      - 
        FireEye IOCs - Indicators
        of Compromise shared publicly by FireEye.
      
 
      - 
        FireHOL IP Lists - Analytics
        for 350+ IP lists with a focus on attacks, malware and abuse. Evolution,
        Changes History, Country Maps, Age of IPs listed, Retention Policy,
        Overlaps.
      
 
      - 
        HoneyDB - Community
        driven honeypot sensor data collection and aggregation.
      
 
      - 
        hpfeeds - Honeypot feed
        protocol.
      
 
      - 
        Infosec - CERT-PA lists
        (IPs -
        Domains
        - URLs) -
        Blocklist service.
      
 
      - 
        InQuest REPdb - Continuous
        aggregation of IOCs from a variety of open reputation sources.
      
 
      - 
        InQuest IOCdb - Continuous
        aggregation of IOCs from a variety of blogs, Github repos, and Twitter.
      
 
      - 
        Internet Storm Center (DShield) -
        Diary and searchable incident database, with a web
        API. (unofficial Python library).
      
 
      - 
        malc0de - Searchable incident
        database.
      
 
      - 
        Malware Domain List -
        Search and share malicious URLs.
      
 
      - 
        MetaDefender Threat Intelligence Feed
        - List of the most looked up file hashes from MetaDefender Cloud.
      
 
      - 
        OpenIOC -
        Framework for sharing threat intelligence.
      
 
      - 
        Proofpoint Threat Intelligence
        - Rulesets and more. (Formerly Emerging Threats.)
      
 
      - 
        Ransomware overview
        - A list of ransomware overview with details, detection and prevention.
      
 
      - 
        STIX - Structured Threat Information eXpression
        - Standardized language to represent and share cyber threat information.
        Related efforts from MITRE:
        
      
 
      - 
        SystemLookup - SystemLookup
        hosts a collection of lists that provide information on the components
        of legitimate and potentially unwanted programs.
      
 
      - 
        ThreatMiner - Data mining
        portal for threat intelligence, with search.
      
 
      - 
        threatRECON - Search for
        indicators, up to 1000 free per month.
      
 
      - 
        ThreatShare - C2 panel tracker
      
 
      - 
        Yara rules - Yara
        rules repository.
      
 
      - 
        YETI - Yeti is a
        platform meant to organize observables, indicators of compromise, TTPs,
        and knowledge on threats in a single, unified repository.
      
 
      - 
        ZeuS Tracker -
        ZeuS blocklists.
      
 
    
    Detection and Classification
    Antivirus and other malware identification tools
    
      - 
        AnalyzePE -
        Wrapper for a variety of tools for reporting on Windows PE files.
      
 
      - 
        Assemblyline
        - A scalable distributed file analysis framework.
      
 
      - 
        BinaryAlert - An
        open source, serverless AWS pipeline that scans and alerts on uploaded
        files based on a set of YARA rules.
      
 
      - 
        capa - Detects
        capabilities in executable files.
      
 
      - 
        chkrootkit - Local Linux
        rootkit detection.
      
 
      - 
        ClamAV - Open source antivirus
        engine.
      
 
      - 
        Detect It Easy(DiE)
        - A program for determining types of files.
      
 
      - 
        Exeinfo PE - Packer, compressor
        detector, unpack info, internal exe tools.
      
 
      - 
        ExifTool -
        Read, write and edit file metadata.
      
 
      - 
        File Scanning Framework
        - Modular, recursive file scanning solution.
      
 
      - 
        fn2yara - FN2Yara is a
        tool to generate Yara signatures for matching functions (code) in an
        executable program.
      
 
      - 
        Generic File Parser
        - A Single Library Parser to extract meta information,static analysis
        and detect macros within the files.
      
 
      - 
        hashdeep - Compute
        digest hashes with a variety of algorithms.
      
 
      - 
        HashCheck - Windows
        shell extension to compute hashes with a variety of algorithms.
      
 
      - 
        Loki - Host based scanner
        for IOCs.
      
 
      - 
        Malfunction -
        Catalog and compare malware at a function level.
      
 
      - 
        Manalyze - Static
        analyzer for PE executables.
      
 
      - 
        MASTIFF -
        Static analysis framework.
      
 
      - 
        MultiScanner -
        Modular file scanning/analysis framework
      
 
      - 
        Nauz File Detector(NFD)
        - Linker/Compiler/Tool detector for Windows, Linux and MacOS.
      
 
      - 
        nsrllookup - A tool
        for looking up hashes in NIST’s National Software Reference Library
        database.
      
 
      - 
        packerid -
        A cross-platform Python alternative to PEiD.
      
 
      - 
        PE-bear - Reversing
        tool for PE files.
      
 
      - 
        PEframe - PEframe is
        an open source tool to perform static analysis on Portable Executable
        malware and malicious MS Office documents.
      
 
      - 
        PEV - A multiplatform toolkit
        to work with PE files, providing feature-rich tools for proper analysis
        of suspicious binaries.
      
 
      - 
        PortEx - Java library
        to analyse PE files with a special focus on malware analysis and PE
        malformation robustness.
      
 
      - 
        Quark-Engine
        - An Obfuscation-Neglect Android Malware Scoring System
      
 
      - 
        Rootkit Hunter - Detect
        Linux rootkits.
      
 
      - 
        ssdeep - Compute
        fuzzy hashes.
      
 
      - 
        totalhash.py
        - Python script for easy searching of the
        TotalHash.cymru.com database.
      
 
      - 
        TrID - File identifier.
      
 
      - 
        YARA - Pattern matching
        tool for analysts.
      
 
      - 
        Yara rules generator -
        Generate yara rules based on a set of malware samples. Also contains a
        good strings DB to avoid false positives.
      
 
      - 
        Yara Finder -
        A simple tool to yara match the file against various yara rules to find
        the indicators of suspicion.
      
 
    
    Online Scanners and Sandboxes
    
      Web-based multi-AV scanners, and malware sandboxes for automated
        analysis.
    
    
      - 
        anlyz.io - Online sandbox.
      
 
      - 
        any.run - Online interactive sandbox.
      
 
      - 
        AndroTotal - Free online analysis
        of APKs against multiple mobile antivirus apps.
      
 
      - 
        AVCaesar - Malware.lu online
        scanner and malware repository.
      
 
      - 
        BoomBox - Automatic
        deployment of Cuckoo Sandbox malware lab using Packer and Vagrant.
      
 
      - 
        Cryptam - Analyze suspicious
        office documents.
      
 
      - 
        Cuckoo Sandbox - Open source,
        self hosted sandbox and automated analysis system.
      
 
      - 
        cuckoo-modified
        - Modified version of Cuckoo Sandbox released under the GPL. Not merged
        upstream due to legal concerns by the author.
      
 
      - 
        cuckoo-modified-api
        - A Python API used to control a cuckoo-modified sandbox.
      
 
      - 
        DeepViz - Multi-format file
        analyzer with machine-learning classification.
      
 
      - 
        detux - A sandbox
        developed to do traffic analysis of Linux malwares and capturing IOCs.
      
 
      - 
        DRAKVUF - Dynamic
        malware analysis system.
      
 
      - 
        firmware.re - Unpacks, scans and
        analyzes almost any firmware package.
      
 
      - 
        HaboMalHunter -
        An Automated Malware Analysis Tool for Linux ELF Files.
      
 
      - 
        Hybrid Analysis - Online
        malware analysis tool, powered by VxSandbox.
      
 
      - 
        Intezer - Detect, analyze, and
        categorize malware by identifying code reuse and code similarities.
      
 
      - 
        IRMA - An asynchronous and
        customizable analysis platform for suspicious files.
      
 
      - 
        Joe Sandbox - Deep malware
        analysis with Joe Sandbox.
      
 
      - 
        Jotti - Free online
        multi-AV scanner.
      
 
      - 
        Limon - Sandbox for
        Analyzing Linux Malware.
      
 
      - 
        Malheur - Automatic
        sandboxed analysis of malware behavior.
      
 
      - 
        malice.io - Massively
        scalable malware analysis framework.
      
 
      - 
        malsub - A Python
        RESTful API framework for online malware and URL analysis services.
      
 
      - 
        Malware config - Extract,
        decode and display online the configuration settings from common
        malwares.
      
 
      - 
        MalwareAnalyser.io - Online
        malware anomaly-based static analyser with heuristic detection engine
        powered by data mining and machine learning.
      
 
      - 
        Malwr - Free analysis with an online
        Cuckoo Sandbox instance.
      
 
      - 
        MetaDefender Cloud - Scan
        a file, hash, IP, URL or domain address for malware for free.
      
 
      - 
        NetworkTotal - A
        service that analyzes pcap files and facilitates the quick detection of
        viruses, worms, trojans, and all kinds of malware using Suricata
        configured with EmergingThreats Pro.
      
 
      - 
        Noriben - Uses
        Sysinternals Procmon to collect information about malware in a sandboxed
        environment.
      
 
      - 
        PacketTotal - PacketTotal is an
        online engine for analyzing .pcap files, and visualizing the network
        traffic within.
      
 
      - 
        PDF Examiner - Analyse
        suspicious PDF files.
      
 
      - 
        ProcDot - A graphical malware
        analysis tool kit.
      
 
      - 
        Recomposer -
        A helper script for safely uploading binaries to sandbox sites.
      
 
      - 
        sandboxapi -
        Python library for building integrations with several open source and
        commercial malware sandboxes.
      
 
      - 
        SEE - Sandboxed Execution
        Environment (SEE) is a framework for building test automation in secured
        Environments.
      
 
      - 
        SEKOIA Dropper Analysis -
        Online dropper analysis (Js, VBScript, Microsoft Office, PDF).
      
 
      - 
        VirusTotal - Free online
        analysis of malware samples and URLs
      
 
      - 
        Visualize_Logs
        - Open source visualization library and command line tools for logs.
        (Cuckoo, Procmon, more to come…)
      
 
      - 
        Zeltser’s List
        - Free automated sandboxes and services, compiled by Lenny Zeltser.
      
 
    
    Domain Analysis
    Inspect domains and IP addresses.
    
      - 
        AbuseIPDB - AbuseIPDB is a
        project dedicated to helping combat the spread of hackers, spammers, and
        abusive activity on the internet.
      
 
      - 
        badips.com - Community based IP
        blacklist service.
      
 
      - 
        boomerang -
        A tool designed for consistent and safe capture of off network web
        resources.
      
 
      - 
        Cymon - Threat intelligence tracker,
        with IP/domain/hash search.
      
 
      - 
        Desenmascara.me - One click tool to
        retrieve as much metadata as possible for a website and to assess its
        good standing.
      
 
      - 
        Dig - Free online dig
        and other network tools.
      
 
      - 
        dnstwist - Domain name
        permutation engine for detecting typo squatting, phishing and corporate
        espionage.
      
 
      - 
        IPinfo - Gather
        information about an IP or domain by searching online resources.
      
 
      - 
        Machinae - OSINT
        tool for gathering information about URLs, IPs, or hashes. Similar to
        Automator.
      
 
      - 
        mailchecker -
        Cross-language temporary email detection library.
      
 
      - 
        MaltegoVT -
        Maltego transform for the VirusTotal API. Allows domain/IP research, and
        searching for file hashes and scan reports.
      
 
      - 
        Multi rbl - Multiple DNS
        blacklist and forward confirmed reverse DNS lookup over more than 300
        RBLs.
      
 
      - 
        NormShield Services -
        Free API Services for detecting possible phishing domains, blacklisted
        ip addresses and breached accounts.
      
 
      - 
        PhishStats - Phishing Statistics
        with search for IP, domain and website title
      
 
      - 
        Spyse - subdomains, whois, realted
        domains, DNS, hosts AS, SSL/TLS info,
       
      - 
        SecurityTrails - Historical
        and current WHOIS, historical and current DNS records, similar domains,
        certificate information and other domain and IP related API and tools.
      
 
      - 
        SpamCop - IP based spam
        block list.
      
 
      - 
        SpamHaus - Block list
        based on domains and IPs.
      
 
      - 
        Sucuri SiteCheck - Free
        Website Malware and Security Scanner.
      
 
      - 
        Talos Intelligence - Search
        for IP, domain or network owner. (Previously SenderBase.)
      
 
      - 
        TekDefense Automater
        - OSINT tool for gathering information about URLs, IPs, or hashes.
      
 
      - 
        URLhaus - A project from
        abuse.ch with the goal of sharing malicious URLs that are being used for
        malware distribution.
      
 
      - URLQuery - Free URL Scanner.
 
      - 
        urlscan.io - Free URL Scanner &
        domain information.
      
 
      - 
        Whois - DomainTools free
        online whois search.
      
 
      - 
        Zeltser’s List
        - Free online tools for researching malicious websites, compiled by
        Lenny Zeltser.
      
 
      - 
        ZScalar Zulu - Zulu URL Risk
        Analyzer.
      
 
    
    Browser Malware
    
      Analyze malicious URLs. See also the
        domain analysis and
        documents and shellcode
        sections.
    
    
      - 
        Bytecode Viewer
        - Combines multiple Java bytecode viewers and decompilers into one tool,
        including APK/DEX support.
      
 
      - 
        Firebug - Firefox extension for
        web development.
      
 
      - 
        Java Decompiler - Decompile and
        inspect Java apps.
      
 
      - 
        Java IDX Parser
        - Parses Java IDX cache files.
      
 
      - 
        JSDetox
        - JavaScript malware analysis tool.
      
 
      - 
        jsunpack-n - A
        javascript unpacker that emulates browser functionality.
      
 
      - 
        Krakatau - Java
        decompiler, assembler, and disassembler.
      
 
      - 
        Malzilla - Analyze
        malicious web pages.
      
 
      - 
        RABCDAsm - A
        “Robust ActionScript Bytecode Disassembler.”
      
 
      - 
        SWF Investigator
        - Static and dynamic analysis of SWF applications.
      
 
      - 
        swftools - Tools for working with
        Adobe Flash files.
      
 
      - 
        xxxswf
        - A Python script for analyzing Flash files.
      
 
    
    Documents and Shellcode
    
      Analyze malicious JS and shellcode from PDFs and Office documents. See
        also the browser malware section.
    
    
      - 
        AnalyzePDF -
        A tool for analyzing PDFs and attempting to determine whether they are
        malicious.
      
 
      - 
        box-js - A tool for
        studying JavaScript malware, featuring JScript/WScript support and
        ActiveX emulation.
      
 
      - 
        diStorm - Disassembler
        for analyzing malicious shellcode.
      
 
      - 
        InQuest Deep File Inspection
        - Upload common malware lures for Deep File Inspection and heuristical
        analysis.
      
 
      - 
        JS Beautifier - JavaScript
        unpacking and deobfuscation.
      
 
      - 
        libemu - Library and tools for
        x86 shellcode emulation.
      
 
      - 
        malpdfobj - Deconstruct
        malicious PDFs into a JSON representation.
      
 
      - 
        OfficeMalScanner -
        Scan for malicious traces in MS Office documents.
      
 
      - 
        olevba - A script
        for parsing OLE and OpenXML documents and extracting useful information.
      
 
      - 
        Origami PDF
        - A tool for analyzing malicious PDFs, and more.
      
 
      - 
        PDF Tools
        - pdfid, pdf-parser, and more from Didier Stevens.
      
 
      - 
        PDF X-Ray Lite - A PDF
        analysis tool, the backend-free version of PDF X-RAY.
      
 
      - 
        peepdf
        - Python tool for exploring possibly malicious PDFs.
      
 
      - 
        QuickSand - QuickSand is a
        compact C framework to analyze suspected malware documents to identify
        exploits in streams of different encodings and to locate and extract
        embedded executables.
      
 
      - 
        Spidermonkey
        - Mozilla’s JavaScript engine, for debugging malicious JS.
      
 
    
    File Carving
    For extracting files from inside disk and memory images.
    
      - 
        bulk_extractor -
        Fast file carving tool.
      
 
      - 
        EVTXtract -
        Carve Windows Event Log files from raw binary data.
      
 
      - 
        Foremost - File carving
        tool designed by the US Air Force.
      
 
      - 
        hachoir3 - Hachoir is
        a Python library to view and edit a binary stream field by field.
      
 
      - 
        Scalpel - Another
        data carving tool.
      
 
      - 
        SFlock - Nested archive
        extraction/unpacking (used in Cuckoo Sandbox).
      
 
    
    Deobfuscation
    Reverse XOR and other code obfuscation methods.
    
      - 
        Balbuzard
        - A malware analysis tool for reversing obfuscation (XOR, ROL, etc) and
        more.
      
 
      - 
        de4dot - .NET deobfuscator
        and unpacker.
      
 
      - 
        ex_pe_xor
        &
        iheartxor
        - Two tools from Alexander Hanel for working with single-byte XOR
        encoded files.
      
 
      - 
        FLOSS - The FireEye
        Labs Obfuscated String Solver uses advanced static analysis techniques
        to automatically deobfuscate strings from malware binaries.
      
 
      - 
        NoMoreXOR -
        Guess a 256 byte XOR key using frequency analysis.
      
 
      - 
        PackerAttacker
        - A generic hidden code extractor for Windows malware.
      
 
      - 
        PyInstaller Extractor
        - A Python script to extract the contents of a PyInstaller generated
        Windows executable file. The contents of the pyz file (usually pyc
        files) present inside the executable are also extracted and
        automatically fixed so that a Python bytecode decompiler will recognize
        it.
      
 
      - 
        uncompyle6 - A
        cross-version Python bytecode decompiler. Translates Python bytecode
        back into equivalent Python source code.
      
 
      - 
        un{i}packer -
        Automatic and platform-independent unpacker for Windows binaries based
        on emulation.
      
 
      - 
        unpacker -
        Automated malware unpacker for Windows malware based on WinAppDbg.
      
 
      - 
        unxor - Guess XOR keys
        using known-plaintext attacks.
      
 
      - 
        VirtualDeobfuscator
        - Reverse engineering tool for virtualization wrappers.
      
 
      - 
        XORBruteForcer
        - A Python script for brute forcing single-byte XOR keys.
      
 
      - 
        XORSearch & XORStrings
        - A couple programs from Didier Stevens for finding XORed data.
      
 
      - 
        xortool - Guess XOR key
        length, as well as the key itself.
      
 
    
    
      Debugging and Reverse Engineering
    
    
      Disassemblers, debuggers, and other static and dynamic analysis
        tools.
    
    
      - 
        angr - Platform-agnostic
        binary analysis framework developed at UCSB’s Seclab.
      
 
      - 
        bamfdetect -
        Identifies and extracts information from bots and other malware.
      
 
      - 
        BAP -
        Multiplatform and open source (MIT) binary analysis framework developed
        at CMU’s Cylab.
      
 
      - 
        BARF -
        Multiplatform, open source Binary Analysis and Reverse engineering
        Framework.
      
 
      - 
        binnavi - Binary
        analysis IDE for reverse engineering based on graph visualization.
      
 
      - 
        Binary ninja - A reversing
        engineering platform that is an alternative to IDA.
      
 
      - 
        Binwalk - Firmware
        analysis tool.
      
 
      - 
        BluePill -
        Framework for executing and debugging evasive malware and protected
        executables.
      
 
      - 
        Capstone - Disassembly
        framework for binary analysis and reversing, with support for many
        architectures and bindings in several languages.
      
 
      - 
        codebro - Web based code
        browser using  clang to provide basic code analysis.
      
 
      - 
        Cutter - GUI for
        Radare2.
      
 
      - 
        DECAF (Dynamic Executable Code Analysis Framework)
        - A binary analysis platform based   on QEMU. DroidScope is now an
        extension to DECAF.
      
 
      - 
        dnSpy - .NET assembly
        editor, decompiler and debugger.
      
 
      - 
        dotPeek - Free .NET
        Decompiler and Assembly Browser.
      
 
      - 
        Evan’s Debugger (EDB)
        - A modular debugger with a Qt GUI.
      
 
      - 
        Fibratus - Tool
        for exploration and tracing of the Windows kernel.
      
 
      - 
        FPort
        - Reports open TCP/IP and UDP ports in a live system and maps them to
        the owning application.
      
 
      - 
        GDB - The GNU debugger.
      
 
      - 
        GEF - GDB Enhanced Features,
        for exploiters and reverse engineers.
      
 
      - 
        Ghidra -
        A software reverse engineering (SRE) framework created and maintained by
        the National Security Agency Research Directorate.
      
 
      - 
        hackers-grep -
        A utility to search for strings in PE executables including imports,
        exports, and debug symbols.
      
 
      - 
        Hopper - The macOS and Linux
        Disassembler.
      
 
      - 
        IDA Pro
        - Windows disassembler and debugger, with a free evaluation version.
      
 
      - 
        IDR - Interactive Delphi
        Reconstructor is a decompiler of Delphi executable files and dynamic
        libraries.
      
 
      - 
        Immunity Debugger -
        Debugger for malware analysis and more, with a Python API.
      
 
      - 
        ILSpy - ILSpy is the open-source .NET
        assembly browser and decompiler.
      
 
      - 
        Kaitai Struct - DSL for file formats /
        network protocols / data structures reverse engineering and dissection,
        with code generation for C++, C#, Java, JavaScript, Perl, PHP, Python,
        Ruby.
      
 
      - 
        LIEF - LIEF provides a
        cross-platform library to parse, modify and abstract ELF, PE and MachO
        formats.
      
 
      - 
        ltrace - Dynamic analysis for Linux
        executables.
      
 
      - 
        mac-a-mal - An
        automated framework for mac malware hunting.
      
 
      - 
        objdump - Part of
        GNU binutils, for static analysis of Linux binaries.
      
 
      - 
        OllyDbg - An assembly-level
        debugger for Windows executables.
      
 
      - 
        OllyDumpEx -
        Dump memory from (unpacked) malware Windows process and store raw or
        rebuild PE file. This is a plugin for OllyDbg, Immunity Debugger, IDA
        Pro, WinDbg, and x64dbg.
      
 
      - 
        PANDA - Platform for
        Architecture-Neutral Dynamic Analysis.
      
 
      - 
        PEDA - Python Exploit
        Development Assistance for GDB, an enhanced display with added commands.
      
 
      - 
        pestudio - Perform static analysis of
        Windows executables.
      
 
      - 
        Pharos - The Pharos
        binary analysis framework can be used to perform automated static
        analysis of binaries.
      
 
      - 
        plasma -
        Interactive disassembler for x86/ARM/MIPS.
      
 
      - 
        PPEE (puppy) - A Professional PE
        file Explorer for reversers, malware researchers and those who want to
        statically inspect PE files in more detail.
      
 
      - 
        Process Explorer
        - Advanced task manager for Windows.
      
 
      - 
        Process Hacker -
        Tool that monitors system resources.
      
 
      - 
        Process Monitor
        - Advanced monitoring tool for Windows programs.
      
 
      - 
        PSTools
        - Windows command-line tools that help manage and investigate live
        systems.
      
 
      - 
        Pyew - Python tool for
        malware analysis.
      
 
      - 
        PyREBox - Python
        scriptable reverse engineering sandbox by the Talos team at Cisco.
      
 
      - 
        QKD - QEMU with
        embedded WinDbg server for stealth debugging.
      
 
      - 
        Radare2 - Reverse engineering
        framework, with debugger support.
      
 
      - 
        RegShot -
        Registry compare utility that compares snapshots.
      
 
      - 
        RetDec - Retargetable machine-code
        decompiler with an
        online decompilation service
        and API that you can use in your
        tools.
      
 
      - 
        ROPMEMU - A
        framework to analyze, dissect and decompile complex code-reuse attacks.
      
 
      - 
        Scylla Imports Reconstructor
        - Find and fix the IAT of an unpacked / dumped PE32 malware.
      
 
      - 
        ScyllaHide - An
        Anti-Anti-Debug library and plugin for OllyDbg, x64dbg, IDA Pro, and
        TitanEngine.
      
 
      - 
        SMRT - Sublime Malware
        Research Tool, a plugin for Sublime 3 to aid with malware analyis.
      
 
      - 
        strace - Dynamic
        analysis for Linux executables.
      
 
      - 
        StringSifter - A
        machine learning tool that automatically ranks strings based on their
        relevance for malware analysis.
      
 
      - 
        Triton - A dynamic binary
        analysis (DBA) framework.
      
 
      - 
        Udis86 - Disassembler
        library and tool for x86 and x86_64.
      
 
      - 
        Vivisect - Python
        tool for malware analysis.
      
 
      - 
        WinDbg
        - multipurpose debugger for the Microsoft Windows computer operating
        system, used to debug user mode applications, device drivers, and the
        kernel-mode memory dumps.
      
 
      - 
        X64dbg - An open-source x64/x32
        debugger for windows.
      
 
    
    Network
    Analyze network interactions.
    
      - 
        Bro - Protocol analyzer that operates
        at incredible scale; both file and network protocols.
      
 
      - 
        BroYara - Use Yara
        rules from Bro.
      
 
      - 
        CapTipper - Malicious
        HTTP traffic explorer.
      
 
      - 
        chopshop - Protocol
        analysis and decoding framework.
      
 
      - 
        CloudShark - Web-based tool for
        packet analysis and malware traffic detection.
      
 
      - 
        FakeNet-NG -
        Next generation dynamic network analysis tool.
      
 
      - 
        Fiddler - Intercepting web
        proxy designed for “web debugging.”
      
 
      - 
        Hale - Botnet C&C
        monitor.
      
 
      - 
        Haka - An open source
        security oriented language for describing protocols and applying
        security policies on (live) captured traffic.
      
 
      - 
        HTTPReplay - Library
        for parsing and reading out PCAP files, including TLS streams using TLS
        Master Secrets (used in Cuckoo Sandbox).
      
 
      - 
        INetSim - Network service
        emulation, useful when building a malware lab.
      
 
      - 
        Laika BOSS - Laika BOSS
        is a file-centric malware analysis and intrusion detection system.
      
 
      - 
        Malcolm - Malcolm is a
        powerful, easily deployable network traffic analysis tool suite for full
        packet capture artifacts (PCAP files) and Zeek logs.
      
 
      - 
        Malcom - Malware
        Communications Analyzer.
      
 
      - 
        Maltrail - A
        malicious traffic detection system, utilizing publicly available
        (black)lists containing malicious and/or generally suspicious trails and
        featuring an reporting and analysis interface.
      
 
      - 
        mitmproxy - Intercept network
        traffic on the fly.
      
 
      - 
        Moloch - IPv4 traffic
        capturing, indexing and database system.
      
 
      - 
        NetworkMiner -
        Network forensic analysis tool, with a free version.
      
 
      - 
        ngrep - Search through
        network traffic like grep.
      
 
      - 
        PcapViz - Network
        topology and traffic visualizer.
      
 
      - 
        Python ICAP Yara
        - An ICAP Server with yara scanner for URL or content.
      
 
      - 
        Squidmagic -
        squidmagic is a tool designed to analyze a web-based network traffic to
        detect central command and control (C&C) servers and malicious
        sites, using Squid proxy server and Spamhaus.
      
 
      - 
        Tcpdump - Collect network traffic.
      
 
      - 
        tcpick - Trach and
        reassemble TCP streams from network traffic.
      
 
      - 
        tcpxtract - Extract
        files from network traffic.
      
 
      - 
        Wireshark - The network traffic
        analysis tool.
      
 
    
    Memory Forensics
    
      Tools for dissecting malware in memory images or running systems.
    
    
      - 
        BlackLight -
        Windows/MacOS forensics client supporting hiberfil, pagefile, raw memory
        analysis.
      
 
      - 
        DAMM - Differential
        Analysis of Malware in Memory, built on Volatility.
      
 
      - 
        evolve - Web
        interface for the Volatility Memory Forensics Framework.
      
 
      - 
        FindAES - Find
        AES encryption keys in memory.
      
 
      - 
        inVtero.net - High
        speed memory analysis framework developed in .NET supports all Windows
        x64, includes code integrity and write support.
      
 
      - 
        Muninn - A script to
        automate portions of analysis using Volatility, and create a readable
        report.
      
 
      - 
        Rekall - Memory analysis
        framework, forked from Volatility in 2013.
      
 
      - 
        TotalRecall -
        Script based on Volatility for automating various malware analysis
        tasks.
      
 
      - 
        VolDiff - Run Volatility
        on memory images before and after malware execution, and report changes.
      
 
      - 
        Volatility
        - Advanced memory forensics framework.
      
 
      - 
        VolUtility -
        Web Interface for Volatility Memory Analysis framework.
      
 
      - 
        WDBGARK - WinDBG
        Anti-RootKit Extension.
      
 
      - 
        WinDbg
        - Live memory inspection and kernel debugging for Windows systems.
      
 
    
    Windows Artifacts
    
      - 
        AChoir - A live
        incident response script for gathering Windows artifacts.
      
 
      - 
        python-evt -
        Python library for parsing Windows Event Logs.
      
 
      - 
        python-registry -
        Python library for parsing registry files.
      
 
      - 
        RegRipper
        (GitHub) -
        Plugin-based registry analysis tool.
      
 
    
    Storage and Workflow
    
      - 
        Aleph - Open Source
        Malware Analysis Pipeline System.
      
 
      - 
        CRITs - Collaborative Research
        Into Threats, a malware and threat repository.
      
 
      - 
        FAME - A
        malware analysis framework featuring a pipeline that can be extended
        with custom modules, which can be chained and interact with each other
        to perform end-to-end analysis.
      
 
      - 
        Malwarehouse -
        Store, tag, and search malware.
      
 
      - 
        Polichombr - A
        malware analysis platform designed to help analysts to reverse malwares
        collaboratively.
      
 
      - 
        stoQ - Distributed content
        analysis framework with extensive plugin support, from input to output,
        and everything in between.
      
 
      - 
        Viper - A binary management and analysis
        framework for analysts and researchers.
      
 
    
    Miscellaneous
    
      - 
        al-khaser - A
        PoC malware with good intentions that aimes to stress anti-malware
        systems.
      
 
      - 
        CryptoKnight
        - Automated cryptographic algorithm reverse engineering and
        classification framework.
      
 
      - 
        DC3-MWCP
        - The Defense Cyber Crime Center’s Malware Configuration Parser
        framework.
      
 
      - 
        FLARE VM - A fully
        customizable, Windows-based, security distribution for malware analysis.
      
 
      - 
        MalSploitBase
        - A database containing exploits used by malware.
      
 
      - 
        Malware Museum -
        Collection of malware programs that were distributed in the 1980s and
        1990s.
      
 
      - 
        Malware Organiser
        - A simple tool to organise large malicious/benign files into a
        organised Structure.
      
 
      - 
        Pafish - Paranoid Fish,
        a demonstration tool that employs several techniques to detect sandboxes
        and analysis environments in the same way as malware families do.
      
 
      - 
        REMnux - Linux distribution and docker
        images for malware reverse engineering and analysis.
      
 
      - 
        Tsurugi Linux - Linux
        distribution designed to support your DFIR investigations, malware
        analysis and OSINT (Open Source INTelligence) activities.
      
 
      - 
        Santoku Linux - Linux
        distribution for mobile forensics, malware analysis, and security.
      
 
    
    Resources
    Books
    Essential malware analysis reading material.
    
    Other
    
      - 
        APT Notes - A collection
        of papers and notes related to Advanced Persistent Threats.
      
 
      - 
        Ember - Endgame
        Malware BEnchmark for Research, a repository that makes it easy to
        (re)create a machine learning model that can be used to predict a score
        for a PE file based on static analysis.
      
 
      - 
        File Formats posters -
        Nice visualization of commonly used file format (including PE &
        ELF).
      
 
      - 
        Honeynet Project - Honeypot tools,
        papers, and other resources.
      
 
      - 
        Kernel Mode - An active
        community devoted to malware analysis and kernel development.
      
 
      - 
        Malicious Software
        - Malware blog and resources by Lenny Zeltser.
      
 
      - 
        Malware Analysis Search
        - Custom Google search engine from
        Corey Harrell.
      
 
      - 
        Malware Analysis Tutorials
        - The Malware Analysis Tutorials by Dr. Xiang Fu, a great resource for
        learning practical malware analysis.
      
 
      - 
        Malware Analysis, Threat Intelligence and Reverse Engineering
        - Presentation introducing the concepts of malware analysis, threat
        intelligence and reverse engineering. Experience or prior knowledge is
        not required. Labs link in description.
      
 
      - 
        Malware Persistence
        - Collection of various information focused on malware persistence:
        detection (techniques), response, pitfalls and the log collection
        (tools).
      
 
      - 
        Malware Samples and Traffic
        - This blog focuses on network traffic related to malware infections.
      
 
      - 
        Malware Search+++
        Firefox extension allows you to easily search some of the most popular
        malware databases
      
 
      - 
        Practical Malware Analysis Starter Kit
        - This package contains most of the software referenced in the Practical
        Malware Analysis book.
      
 
      - 
        RPISEC Malware Analysis
        - These are the course materials used in the Malware Analysis course at
        at Rensselaer Polytechnic Institute during Fall 2015.
      
 
      - 
        WindowsIR: Malware
        - Harlan Carvey’s page on Malware.
      
 
      - 
        Windows Registry specification
        - Windows registry file format specification.
      
 
      - 
        /r/csirt_tools -
        Subreddit for CSIRT tools and resources, with a
        malware analysis
        flair.
      
 
      - 
        /r/Malware - The malware
        subreddit.
      
 
      - 
        /r/ReverseEngineering
        - Reverse engineering subreddit, not limited to just malware.
      
 
    
    
    
    
    
      Pull requests and issues with suggestions are welcome! Please read the
      CONTRIBUTING guidelines before submitting a
      PR.
    
    Thanks
    This list was made possible by:
    
      - 
        Lenny Zeltser and other contributors for developing REMnux, where I
        found many of the tools in this list;
      
 
      - 
        Michail Hale Ligh, Steven Adair, Blake Hartstein, and Mather Richard for
        writing the Malware Analyst’s Cookbook, which was a big
        inspiration for creating the list;
      
 
      - 
        And everyone else who has sent pull requests or suggested links to add
        here!
      
 
    
    Thanks!