Josh Stroschein (jstrosch)

jstrosch

Geek Repo

Company:M9 Cyber

Location:United States

Home Page:thecyberyeti.com

Twitter:@jstrosch

Github PK Tool:Github PK Tool

Josh Stroschein's starred repositories

magika

Detect file content types with deep learning

Language:PythonLicense:Apache-2.0Stargazers:7485Issues:36Issues:341

flare-vm

A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.

Language:PowerShellLicense:Apache-2.0Stargazers:6003Issues:201Issues:500

dnSpy

Unofficial revival of the well known .NET debugger and assembly editor, dnSpy

Language:C#License:GPL-3.0Stargazers:5994Issues:125Issues:208

lensm

Go assembly and source viewer

Language:GoLicense:MITStargazers:3382Issues:22Issues:16

malware-samples

Malware samples, analysis exercises and other interesting resources.

Language:HTMLStargazers:1406Issues:87Issues:0

awesome-ida-x64-olly-plugin

A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.

RATDecoders

Python Decoders for Common Remote Access Trojans

Language:PythonLicense:MITStargazers:1060Issues:121Issues:19

StalkPhish

StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.

Language:PythonLicense:AGPL-3.0Stargazers:610Issues:27Issues:38

learning-malware-analysis

This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to worry about handling live malware.

ttddbg

Time Travel Debugging IDA plugin

Language:C++License:Apache-2.0Stargazers:548Issues:17Issues:10

GoReSym

Go symbol recovery tool

Language:GoLicense:MITStargazers:479Issues:12Issues:33

learning-reverse-engineering

This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.

dalton

Suricata and Snort IDS rule and pcap testing system

Language:PythonLicense:Apache-2.0Stargazers:431Issues:43Issues:22

evebox

Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search

Language:RustLicense:MITStargazers:408Issues:41Issues:215

STrace

A DTrace on Windows Reimplementation

Language:C++License:MITStargazers:309Issues:14Issues:10

what_is_this_c2

For all these times you're asking yourself "what is this panel again?"

Beta

Beta versions of my software

RETools

My reversing tools. Some custom, some not.

Language:C++License:MITStargazers:186Issues:4Issues:4

PhishingKit-Yara-Rules

Repository of Yara rules dedicated to Phishing Kits Zip files

Language:YARALicense:AGPL-3.0Stargazers:182Issues:19Issues:5

pcasm

PC Assembly language book

sclauncher

A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode.

Language:CLicense:MITStargazers:95Issues:2Issues:3

subparse

Modular malware analysis artifact collection and correlation framework

Language:PythonLicense:MITStargazers:49Issues:4Issues:0

subcrawl

SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data with optional output modules, such as Elastic.

Language:PythonLicense:MITStargazers:46Issues:2Issues:0

Configuration_extractors

Configuration Extractors for Malware

suricata-4-analysts

The Security Analyst’s Guide to Suricata

Language:PythonLicense:CC-BY-SA-4.0Stargazers:45Issues:6Issues:1
Language:JavaScriptLicense:Apache-2.0Stargazers:37Issues:2Issues:0

idapython

My IDA Python scripts.

Language:PythonLicense:MITStargazers:14Issues:4Issues:0
Language:PythonLicense:BSD-3-ClauseStargazers:3Issues:2Issues:0