COLLECTED BY
Web crawl data from Common Crawl.
The Wayback Machine - https://web.archive.org/web/20210928220239/https://github.com/topics/fireeye-flare
Here are
26 public repositories
matching this topic...
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution.
[email protected]
-
Updated
Jul 24, 2021
-
PowerShell
-
Updated
May 3, 2021
-
PowerShell
FireEye Labs Obfuscated String Solver - Automatically extract obfuscated strings from malware.
-
Updated
Sep 27, 2021
-
Python
IDA Pro utilities from FLARE team
-
Updated
Aug 20, 2021
-
Python
[Suspended] FakeNet-NG - Next Generation Dynamic Network Analysis Tool
-
Updated
Nov 11, 2020
-
Python
GoCrack is a management frontend for password cracking tools written in Go
-
Updated
Apr 19, 2021
-
Python
A machine learning tool that ranks strings based on their relevance for malware analysis.
-
Updated
Dec 2, 2020
-
Python
IDA Pro loader and processor modules for WebAssembly
-
Updated
Oct 4, 2018
-
Python
IDA Pro plugin to assist with complex graphs
Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.
-
Updated
May 24, 2021
-
Python
flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.
-
Updated
Oct 5, 2017
-
Python
FLARE Kernel Shellcode Loader
Automatic analysis of SWF files based on some heuristics. Extensible via plugins.
-
Updated
Jun 19, 2019
-
Python
The User Interface for GoCrack
-
Updated
Aug 26, 2019
-
Python
libemu shim layer and win32 environment for Unicorn Engine
Resolves DLL API entrypoints for a process w/ remote query capabilities.
-
Updated
Jun 23, 2017
-
Visual Basic
Protocol Analysis/Decoder Framework
-
Updated
Jun 21, 2014
-
Python
PyCommand Scripts for Immunity Debugger
-
Updated
Jun 21, 2014
-
Python
Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code
-
Updated
Apr 22, 2019
-
Python
-
Updated
Feb 27, 2017
-
Python
Provides access to libhashcat
JITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.
Poison Ivy Appendix/Extras
Improve this page
Add a description, image, and links to the
fireeye-flare
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
fireeye-flare
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.