Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Top 8 C malware-analysis Projects
-
pafish
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
hollows_hunter
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
-
dumpulator
An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).
-
Stuxnet-Source
stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Samples,Fanny Added in another repo.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
-
hem-hashes
Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block
Project mention: Is there still a way to counter virtual machine detection by popular anti cheat? | /r/VFIO | 2023-12-05Pafish is what you asking for, but as u/ForceBlade wrote, you cannot win this game.
Project mention: Deep Dive into XZ Utils Backdoor – Columbia Engineering Guest Lecture [video] | news.ycombinator.com | 2024-04-30Worth a watch. There's also this GitHub where there's reverse engineering going on: https://github.com/smx-smx/xzre
We now know the answer to the question of "who would win?"
1) A years-long nation-state-backed hacking effort to infiltrate a software project and compromise most servers in the Western world
or
2) A German's obsession with efficiency and precision in engineering
Project mention: Hiew editor plugin to calculate MD5, SHA-1, and SHA-256 hashes for a given file/block | /r/ReverseEngineering | 2023-07-29
C malware-analysis related posts
-
Deep Dive into XZ Utils Backdoor – Columbia Engineering Guest Lecture [video]
-
Rileva hollow code injection in windows
-
Is it possible a spyware can hide it's processes in task manager details and in services tab?
-
Get "File Version" from an exe file stored on Linux
-
Hollows Hunter – Scans all running processes
-
rabin2 for scraping ELF to JSON
-
A note from our sponsor - InfluxDB
www.influxdata.com | 17 May 2024
Index
What are some of the best open-source malware-analysis projects in C? This list will help you:
Project | Stars | |
---|---|---|
1 | radare2 | 19,679 |
2 | pafish | 3,087 |
3 | hollows_hunter | 1,885 |
4 | dumpulator | 672 |
5 | mal_unpack | 637 |
6 | Stuxnet-Source | 155 |
7 | xzre | 81 |
8 | hem-hashes | 35 |
Sponsored