MANDIANT
MANDIANT
flare-vm
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
flare-floss
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
stringsifter
A machine learning tool that ranks strings based on their relevance for malware analysis.
commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]
FIDL
A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
capa
The FLARE team's open-source tool to identify capabilities in executable files.
flare-fakenet-ng
FakeNet-NG - Next Generation Dynamic Network Analysis Tool
ThreatPursuit-VM
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well a...
thiri-notebook
The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat hunting rules.
heyserial
Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, and rule types