Grow your team on GitHub
GitHub is home to over 50 million developers working together. Join them to grow your own development teams, manage permissions, and collaborate on projects.
Sign upRepositories
-
capa
The FLARE team's open-source tool to identify capabilities in executable files.
-
HXTool
HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physical workstation. HXTool provides additional features and capabilities over the standard FireEye HX web user interface. HXTool uses the fully documented REST API that comes with the FireEye HX for communication w…
-
capa-rules
Standard collection of rules for capa: the tool for enumerating the capabilities of programs
-
dod-example-apps
Example applications for FireEye's Detection on Demand service
-
flare-ida
IDA Pro utilities from FLARE team
-
flare-floss
FireEye Labs Obfuscated String Solver - Automatically extract obfuscated strings from malware.
-
jitm
JITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.
-
jest-environment-serverless
Testing your Serverless projects with Jest the easy way!
-
-
FIDL
A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
-
flare-qdb
Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.
-
commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@fireeye.com
-
flare-fakenet-ng
FakeNet-NG - Next Generation Dynamic Network Analysis Tool
-
rvmi-rekall
Rekall Forensics and Incident Response Framework with rVMI extensions
-
-
ioc-scanner-CVE-2019-19781
Indicator of Compromise Scanner for CVE-2019-19781
-
Crescendo
Forked from SuprHackerSteve/CrescendoCrescendo is a swift based, real time event viewer for macOS. It utilizes Apple's Endpoint Security Framework.
-
stringsifter
A machine learning tool that ranks strings based on their relevance for malware analysis.