Open Source intrusion prevention system capable of real-time traffic analysis and packet logging.
Open Source antivirus engine for detecting trojans, viruses, malware, & other malicious threats.
Security tool for analysts to identify PE section hashes for executable files, allows for the simple creation of ClamAV section based signatures..
A network scanner and utility for detecting signs of the SYNFul Knock router malware.
Disk filter that blocks write access to the Master Boot Record.
The Function Identification and Recover Signature Tool (FIRST) is an IDA Pro plugin that allows reverse engineers to more quickly complete static analysis.
A network scanner and utility for detecting Cisco Smart Install client protocol.
Framework that automatically generates pattern-based antivirus signatures from previously generated malware sample clusters.
Versatile multi-protocol and portable network proxy. Use with the Mutiny Fuzzing Framework for quick and easy network fuzzing.
The Mutiny Fuzzing Framework is a network fuzzer that operates by replaying PCAPs through a mutational fuzzer. The goal is to begin network fuzzing as quickly as possible.
Dynamic Data Resolver (DDR) is an IDA plugin that resolves dynamic data such registers and memory pointers by leveraging the DynamoRio instrumentation framework.
Open source tool for decrypting and restoring files, to their original content, encrypted by the ransomware PyLocky.
Simple, fast network packet logger and soft tap designed specifically for use in NSM environments.
Software security framework containing automated security tools for vulnerability, discovery, and triage of vulnerabilities in software.
Malware protection system that utilizes cloud computing and social networking to provide community security.
Open source command line utility for decrypting TeslaCrypt ransomware and returning user files to their original content.
Open source utility for decrypting files encrypted by the Thanatos ransomware.
Open source Locky configuration extractor which can dump the configuration parameters used by all currently known variants of Locky e.g. .locky, .zepto, & .odin based ransomware.
LLVM plugin that makes exploitation of use-after-free vulnerabilities more difficult.
Open source collection of scripts that help automate portions of the analysis of Flokibot malware.
Framework to analyze, dissect and decompile complex code-reuse attacks.
Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU.
File2pcap creates pcaps from any input file, showing the file in transit via Http/Smtp/Imap/Pop3/Ftp or Http2 over IPv4 or IPv6.