flare-fakenet-ng
flare-floss
flare-fakenet-ng | flare-floss | |
---|---|---|
2 | 4 | |
1,700 | 3,024 | |
1.8% | 1.1% | |
4.1 | 9.2 | |
8 days ago | 2 days ago | |
Python | Python | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
flare-fakenet-ng
-
Ask HN: What is your home networking setup?
* INetSim [1]
Reverse engineering, and malware analysis skills will transfer to this task directly.
[0]: https://github.com/mandiant/flare-fakenet-ng
-
DYNAMIC MALWARE ANALYSIS WITH INTERNET
Hi, what you are looking for is Fakenet or the newer, separate version fakenet-ng https://github.com/fireeye/flare-fakenet-ng
flare-floss
-
Why is this de-compiled code showing a different value in memory sometimes?
Depending on how clever the developer was, this tool works well to find hidden strings: https://github.com/mandiant/flare-floss
-
Static Analysis Research - Windows PE
Recently, I decided do delve a little bit more into static analysis, something beyond just running strings on a binary and getting the ASCII characters that are printable. I decided to take a deep look at how FLOSS is working and possibly recreate some of its functionality in my own tool.
- Hogy lehet észrevenni, ha valaki bejár a gépedre és adatot visz ki? KRÉTA sztori spin-off
- Installed Kaspersky today, Trojan.Win32.Hosts2.gen detected. Malwarebytes and Windows Defender didn’t detected it before. False positive?
What are some alternatives?
flare-vm - A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
yara - The pattern matching swiss knife
flare-ida - IDA Pro utilities from FLARE team
capa - The FLARE team's open-source tool to identify capabilities in executable files.
theZoo - A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
gsoc - NumFOCUS Google Summer of Code Materials
refinery - High Octane Triage Analysis
win32-shellcode - Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers
Mobile-Security-Framework-MobSF - Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
pytextcodifier - :package: Turn your text files into codified images or your codified images into text files.
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
peresources