mirror of
https://github.com/nganhkhoa/malware.git
synced 2024-06-10 21:32:07 +07:00
32 lines
1.1 KiB
Markdown
32 lines
1.1 KiB
Markdown
# Tools
|
|
### Online Sandbox
|
|
|name|site|remarks|
|
|
|:-|:-|:-|
|
|
|AMAaaS|https://amaaas.com/|apk only|
|
|
|ANYRUN|https://app.any.run/#register||
|
|
|Intezer Analyze|https://analyze.intezer.com/#/||
|
|
|IRIS-H|https://iris-h.services/pages/dashboard|maldoc only|
|
|
|CAPE Sandbox|https://cape.contextis.com/||
|
|
|Joe Sandbox Cloud|https://www.joesandbox.com/||
|
|
|cuckoo|https://cuckoo.cert.ee/||
|
|
|cuckoo|https://sandbox.pikker.ee/||
|
|
|Hybrid Analysis|https://www.hybrid-analysis.com/?lang=ja||
|
|
|ViCheck|https://www.vicheck.ca/submitfile.php||
|
|
|Triage|https://tria.ge/||
|
|
|Yomi Sandbox|https://yomi.yoroi.company/upload||
|
|
|UnpacMe|https://www.unpac.me/#/|online unpacker,beta|
|
|
|
|
# Doc Analysis
|
|
- VBA マクロの解析についての資料<br>
|
|
[Advanced VBA Macros Attack&Defence,BHEU2019](https://www.decalage.info/files/eu-19-Lagadec-Advanced-VBA-Macros-Attack-And-Defence.pdf)<br>
|
|
|
|
# Binary Analysis
|
|
### Symbolic Execurtion
|
|
to do...
|
|
### Taint Analysis
|
|
to do...
|
|
### Decompiler
|
|
### ref:
|
|
- Intel系アーキテクチャSoftware Developer向けのマニュアル<br>
|
|
[Intel® 64 and IA-32 Architectures Software Developer Manuals](https://software.intel.com/en-us/articles/intel-sdm)<br>
|