Uma lista selecionada de repositórios de malware, rastreadores e ferramentas de análise de malware
VirusTotal - https://virustotal.com
VirusBay - https://beta.virusbay.io
MalBeacon - https://malbeacon.com
Tráfego.moe - https://traffic.moe
Análise de tráfego de Brad - https://www.malware-traffic-análise.net
theZoo - https://github.com/ytisf/theZoo/tree/master/malwares
Contágio - https://contagiodump.blogspot.com
OpenMalware – https://openmalware.com
Virusign - http://www.virusign.com
DasMelwerk - https://dasmalwerk.eu
Malquarium - https://malquarium.org
VirusShare - https://virusshare.com
MalwareOne – https://malware.one
AVCaesar - https://avcaesar.malware.lu
0xffff0800 - https://iec56w4ibovnb4wc.onion.si/Library
Malshare.com - https://malshare.com
Malshare.io - https://malshare.io
https://github.com/fabrimagic72/malware-samples
https://github.com/InQuest/malware-samples
https://github.com/0x48piraj/MalWAReX
https://github.com/NEUAI/MalwareLibrary
https://github.com/Tlgyt/The-Collection
URLHaus - https://urlhaus.abuse.ch/browse/
ViriBack - http://tracker.viriback.com
0btemoslab - http://tracker.0btemoslab.com
Malwaresuck – https://malwaresuck.com
Benkow - http://benkow.cc/passwords.php?page=1
Haruko - https://tracker.fumik0.com
VXVault - http://vxvault.net/ViriList.php
Rastreador CC - https://cybercrime-tracker.net
Malc0de - http://malc0de.com/database
CRDF - https://threatcenter.crdf.fr
MDL - https://www.malwaredomainlist.com/mdl.php
Tweet COI - http://tweettioc.com
Rastreador de ladrão - http://malwr.cc
ThreatShare - https://threatshare.io/malware/
VirusTotal - https://www.virustotal.com
Análise Híbrida - https://www.hybrid-análise.com
VMRay - https://www.vmray.com
Sndbox - https://app.sndbox.com
VirusBay - https://beta.virusbay.io
Any.run - https://app.any.run
Tria.ge - https://tria.ge
Intezer - https://analyze.intezer.com
Malwr - https://malwr.com
Cuco Malwr - http://mlwr.ee
Metadefender - https://metadefender.opswat.com
Valquíria - https://valkyrie.comodo.com
Joe Sandbox - https://www.joesandbox.com
Pikker - http://sandbox.pikker.ee
ViCheck - https://www.vicheck.ca
Jotti - https://virusscan.jotti.org
Virscan - http://virscan.org
Anúbis - http://anubis.iseclab.org
Wepawet - https://wepawet.cs.ucsb.edu
Analisador - https://manalyzer.org
Despacme - https://www.unpac.me
arquivo
trid
cordas
fio dental
xxd
reparação
ssprofundo
Telhash
autenticaçãohash
gdb
traço
radare2
exiftool
elfdump
objdump
leia-se
elfutils
pax-utils
impash
ssprofundo
autenticaçãohash
extrator a granel
uudeview
acima de tudo
bisturi
esconderijo
Stegsnow
zsteg
estegosuite
quebra de passo
stegdetect
PEpper - https://github.com/Th3Hurrican3/PEpper
pev
pecarve
pescanner.py
analisarPE.py
AnalisarPE
upx
Yara
ripPE - https://github.com/matonis/ripPE
Unipacker - https://github.com/unipacker/unipacker
Explorador CFF - https://ntcore.com/?page_id=388
Hacker de recursos - http://www.angusj.com/resourcehacker
Hacker de recursos XN - https://stefansundin.github.io/xn_resource_editor
Dependency Walker - http://www.dependencywalker.com
LordPE - http://www.woodmann.com/collaborative/tools/images/Bin_LordPE_2010-6-29_3.9_LordPE_1.41_Deluxe_b.zip
Cila - https://github.com/NtQuery/Scylla
Detecte facilmente - https://ntinfo.biz
PE Explorer - http://www.heaventools.com/overview.htm
Importar REConstructor - https://github.com/NtQuery/Scylla
LordPE - https://www.aldeid.com/wiki/LordPE
PEiD - https://www.aldeid.com/wiki/PEiD
PEview - https://www.aldeid.com/wiki/PEView
FileAlyzer - https://www.safer-networking.org/products/filealyzer/
PEstudio - https://www.winitor.com/
Chimpanzé - https://www.aldeid.com/wiki/CHimpREC
PE Insider - https://cerbero.io/peinsider/
PEframe - https://github.com/guelfoweb/peframe
UPX - https://github.com/upx
Analisar - https://github.com/JusticeRage/Manalyze
PortEx - https://github.com/katjahahn/PortEx
Signsrch - https://aluigi.altervista.org/mytoolz/signsrch.zip
Revelo - http://www.kahusecurity.com/2012/05/revelo-javascript-deobfuscator
UniExtract2 - https://github.com/Bioruebe/UniExtract2
MalUnpack - https://github.com/hasherezade/mal_unpack
PE_recovery_tools - https://github.com/hasherezade/pe_recovery_tools
Descriptografador XOR automático - https://github.com/MRGEffitas/scripts/blob/master/auto_xor_decryptor.py
Violinista - https://www.telerik.com/fiddler
Suíte Burp - https://portswigger.net/burp/communitydownload
FakeDNS - https://www.fireeye.com/services/freeware/apatedns.html
ApateDNS - https://github.com/Crypt0s/FakeDns
FakeNet - https://github.com/fireeye/flare-fakenet-ng
INetSim - https://www.inetsim.org
netcat - http://netcat.sourceforge.net
TCPView - https://docs.microsoft.com/en-us/sysinternals/downloads/tcpview
Wireshark – https://www.wireshark.org
C2 imaginário - https://github.com/felixweyne/imaginaryC2
Suricata - https://suricata-ids.org/download/
SIGs de ameaças emergentes - https://rules.emergingthreats.net/
Tor - https://www.torproject.org/
RegShot - https://sourceforge.net/projects/regshot
WhatChanged - https://www.majorgeeks.com/files/details/what_changed.html
CaptureBAT - https://www.honeynet.org/node/315
Hacker de processo - https://github.com/processhacker/processhacker
Monitor de Processo - https://docs.microsoft.com/en-us/sysinternals/downloads/procmon
Explorador de processos - https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer
ProcessSpawnControl - https://github.com/felixweyne/ProcessSpawnControl
ProcDOT - http://www.procdot.com
Monitor de API - http://www.rohitab.com/apimonitor#Download
APISpy - http://www.matcode.com/apis32.htm
Execuções automáticas - https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns
volatilidade - https://github.com/volatilityfoundation/volatility
Memoryze - https://www.fireeye.com/services/freeware/memoryze.html
Carregador de driver OSR - https://www.aldeid.com/wiki/OSR-Driver-Loader
O Kit Detetive - https://github.com/sleuthkit/sleuthkit
Truman - http://nsmwiki.org/Truman_Overview
yara - https://github.com/virustotal/yara
mastim - https://github.com/KoreLogicSecurity/mastiff
IRMA - https://github.com/quarkslab/irma
VIPER - https://github.com/viper-framework/viper
Loki - https://github.com/Neo23x0/Loki
Multiscanner - https://github.com/mitre/multiscanner
chopshop - https://github.com/MITRECND/chopshop
Munin - https://github.com/Neo23x0/munin
Fenrir - https://github.com/Neo23x0/Fenrir
Arpão - https://github.com/Neo23x0/harpoon
On-line - https://onlinedisassembler.com/static/home/index.html
IDA - https://www.hex-rays.com/products/ida/
Descompilador Hex-Rays - https://www.hex-rays.com/products/decompiler/
radare2 - https://github.com/radare/radare2
Ninja Binário - https://binary.ninja/
BinDiff - https://www.zynamics.com/bindiff.html
BinNavi - https://github.com/google/binnavi
Bochs - http://bochs.sourceforge.net/getcurrent.html
x64dbg - https://x64dbg.com/#start
WinDbg - https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-download-tools
OllyDbg - http://www.ollydbg.de/
ImmunityDbg - https://www.immunityinc.com/products/debugger/
xorsearch - https://blog.didierstevens.com/2014/09/29/update-xorsearch-with-shellcode-detector/
scdbg - http://sandsprite.com/blogs/index.php?uid=7&pid=152
shellcode2exe - https://zeltser.com/convert-shellcode-to-assembly/
jmp2it - https://digital-forensics.sans.org/blog/2014/12/30/take-control-of-the-instruction-pointer/
BlobRunner - https://github.com/OALabs/BlobRunner
dnSpy - https://github.com/0xd4d/dnSpy
dotPeek - https://www.jetbrains.com/decompiler
ILSpy - https://github.com/icsharpcode/ILSpy
JustDecompile - https://www.telerik.com/products/decompiler.aspx
JustAssembly - https://www.telerik.com/justassembly
Refletor - https://www.red-gate.com/products/dotnet-development/reflector/index
CodeReflect - http://www.devextras.com/decompiler
Dis # - http://www.netdecompiler.com
Desmontador IL - https://www.dotnetperls.com/il-disassembler
Diagnosticador de desmontagem - https://adamsitnik.com/Disassembly-Diagnoser
V8 - https://isc.sans.edu/diary/V8+as+an+Alternative+to+SpiderMonkey+for+JavaScript+Deobfuscation/12157
box-js - https://github.com/CapacitorSet/box-js
js-detox - https://github.com/svent/jsdetox
SWFDec - https://cgit.freedesktop.org/wiki/swfdec
swf_mastah.py - https://github.com/9b/pdfxray_lite/blob/master/swf_mastah.py
ViperMonkey - https://github.com/decalage2/ViperMonkey
olevba.py - https://github.com/decalage2/oletools/wiki/olevba
OfficeMalScanner - http://www.reconstructer.org/code/OfficeMalScanner.zip
Ferramentas OLE - https://www.decalage.info/python/oletools
Hachoir - https://bitbucket.org/haypo/hachoir/wiki/hachoir-urwid
EXEFiltro - http://www.decalage.info/exefilter
rtfproc
rtfprocrule
rtfraptor
rtfscan
rtfobj
analisador rtf
rtfdump
Dumper de fluxo de PDF - http://sandsprite.com/blogs/index.php?uid=7&pid=57
Dissecador de PDF - https://blog.zynamics.com/2010/09/03/pdf-dissector-1-7-0-released/
Ferramentas PDF - https://blog.didierstevens.com/programs/pdf-tools/
pdfid.py - https://blog.didierstevens.com/programs/pdf-tools/
pdfparser.py - https://blog.didierstevens.com/programs/pdf-tools/
peepdf.py - https://github.com/jesparza/peepdf
qpdf - http://qpdf.sourceforge.net/
pdfinfo
pdf2txt
pdfdetach
Ferramentas de segurança Kahu - http://www.kahusecurity.com/tools.html
DidierStevensSuite - https://github.com/DidierStevens/DidierStevensSuite
Lista incrível de análise de malware - https://github.com/rshipp/awesome-malware-análise
Lista de reversão incrível - https://github.com/tylerha97/awesome-reversing
Remnux - https://remnux.org/
SANS SIFT - https://digital-forensics.sans.org/community/downloads
FireEye FLARE-VM – https://github.com/fireeye/flare-vm
FireEye CommandoVM – https://github.com/fireeye/commando-vm
Webshell-intel - https://github.com/Neo23x0/webshell-intel
Comportamentos de malware - https://github.com/MAECProject/malware-behaviors
MalTrail - https://github.com/stamparm/maltrail
YaraScanner - https://github.com/mitre/yararules-python
Analisador Yara - https://github.com/Neo23x0/yarAnalyzer
Gerador Yara - https://github.com/Neo23x0/yarGen
Incrível-Yara - https://github.com/Neo23x0/awesome-yara
Assinaturas de malware - https://github.com/Neo23x0/malware-signatures
Conjunto de assinaturas - https://github.com/Neo23x0/signature-base
Regras Yara - https://github.com/Neo23x0/rules
mkYARA - https://blog.fox-it.com/2019/03/28/mkyara-writing-yara-rules-for-the-lazy-analyst/
Artigo do investigador VT - https://storage.googleapis.com/vt-gtm-wp-media/virustotal-for-investigators.pdf