Open Source intrusion prevention system capable of real-time traffic analysis and packet logging.
Open Source anti-virus engine for detecting trojans, viruses, malware and other malicious threats.
Security tool for analysts to identify PE section hashes for executable files, allows for the simple creation of ClamAV section-based signatures.
A network scanner and utility for detecting signs of the SYNFul Knock router malware.
Disk filter that blocks write access to the Master Boot Record.
The Function Identification and Recover Signature Tool (FIRST) is an IDA Pro plugin that allows reverse engineers to more quickly complete static analysis.
A network scanner and utility for detecting Cisco Smart Install client protocol.
Framework that automatically generates pattern-based anti-virus signatures from previously generated malware sample clusters.
Versatile multi-protocol and portable network proxy. Use with the Mutiny Fuzzing Framework for quick and easy network fuzzing.
The Mutiny Fuzzing Framework is a network fuzzer that operates by replaying PCAPs through a mutational fuzzer. The goal is to begin network fuzzing as quickly as possible.
Dynamic Data Resolver (DDR) is an IDA plugin that resolves dynamic data such registers and memory pointers by leveraging the DynamoRio instrumentation framework.
Open-source tool for decrypting and restoring files, to their original content, encrypted by the ransomware PyLocky.
Open-source cross-platform and general-purpose dependency build automation tool.
Simple, fast network packet logger and soft tap designed specifically for use in NSM environments.
Software security framework containing automated security tools for vulnerability, discovery, and triage of vulnerabilities in software.
Malware protection system that utilizes cloud computing and social networking to provide community security.
Open-source command-line utility for decrypting TeslaCrypt ransomware and returning user files to their original content.
Open-source utility for decrypting files encrypted by the Thanatos ransomware.
Open-source Locky configuration extractor that dumps the configuration parameters in all currently known variants of Locky, including .locky, .zepto and .odin.
LLVM plugin that makes exploitation of use-after-free vulnerabilities more difficult.
Open-source collection of scripts that help automate portions of the analysis of Flokibot malware.
Framework to analyze, dissect and decompile complex code-reuse attacks.
Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU.
File2pcap creates pcaps from any input file, showing the file in transit via HTTP/SMTP/IMAP/POP3/FTP or HTTP2 over IPv4 or IPv6.
Re2Pcap creates a Pcap file from a raw HTTP request or response in seconds.
GhIDA is an IDA Pro plugin that integrates the Ghidra decompiler in the IDA workflow.
This plugin adds support to IDA Pro for disassembling Tilera's TileGX architecture.