search
Join or Log In

Malware Analysis

Browse 15 cybersecurity tools tagged with "Malware Analysis"

ANY.RUN

ANY.RUN

United Arab Emirates flag

Security Operations

ANY.RUN is a cloud-based malware analysis service delivering an interactive sandbox for analyzing suspicious and malicious activities. It provides threat intelligence lookup and threat intelligence fe

4.7(2)
APT Groups and Operations

APT Groups and

language

Threat Intelligence Platforms

APT Groups and Operations on SecurityListing: A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.

4.5(3)
Joe Sandbox (Community)

Joe Sandbox (Community)

language

Network Sandboxing

Joe Sandbox (Community) on SecurityListing: Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.

4.5(1)
Threat.Zone

Threat.Zone

language

Digital Forensics and Incident Response

Threat.Zone on SecurityListing: Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.

4.5(1)
HoneyDrive

HoneyDrive

language

Security Operations

HoneyDrive on SecurityListing: HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.

4.5(1)
Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach

Dr. Fu's Security

language

Guides

Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach on SecurityListing: A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.

4.5(1)
Hybrid-Analysis

Hybrid-Analysis

language

Threat Intelligence Platforms

Hybrid-Analysis on SecurityListing: Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.

4.5(1)
PolySwarm Scan Files or URLs for threats

PolySwarm Scan Files

language

Security Scanning

PolySwarm Scan Files or URLs for threats on SecurityListing: File and URL scanning service for malware and threat detection

4.5(1)
PosixSpawn

PosixSpawn

United Arab Emirates flag

Application Security

PosixSpawn specializes in protecting companies from cyber attacks and performing security research on a wide range of software and devices. It provides defensive information security solutions globall

4.5(1)
Viper

Viper

language

Digital Forensics and Incident Response

Viper on SecurityListing: A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.

3.9(2)
HYAS Insight

HYAS Insight

language

Threat Hunting

HYAS Insight on SecurityListing: Infrastructure intelligence platform for threat hunting and investigation

3.8(1)
The DFIR Report

The DFIR Report

language

Threat Intelligence Platforms

The DFIR Report on SecurityListing: In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

Security Trainings

Security Trainings

language

Guides

Security Trainings on SecurityListing: Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.

Reversing With Lena (Tutorials)

Reversing With Lena

language

Guides

Reversing With Lena (Tutorials) on SecurityListing: Educational resources for reverse engineering tutorials by lena151.

PolySwarm Malware Intelligence

PolySwarm Malware Intelligence

language

Threat Intelligence Platforms

PolySwarm Malware Intelligence on SecurityListing: Malware intelligence marketplace aggregating multiple detection engines