What is Maldrolyzer

Python 3 tool for parsing Yara rules with ongoing development.

Simple Framework for Extracting Actionable Data

This is a simple framework designed to extract "actionable" data from Android malware, including command and control servers (C&Cs), phone numbers, and more.

Installation Instructions

Before you begin using this project, you need to install the following packages: 1. Androguard: Clone the repository using the command `git clone https://github.com/androguard/androguard`, navigate into the directory with `cd androguard`, and then run `sudo python setup.py install`. 2. PyCrypto: Install it using the command `easy_install pycrypto`. 3. pyelftools: You can install this package with `easy_install pyelftools`. 4. yara: Finally, install it using `easy_install yara`.

The project has a couple of directories for static analysis and output processing

The project contains a couple of directories that serve as locations for your static analysis or output processing: plugins - This is where the code responsible for malware identification and data extraction resides. Every class must inherit from the Plugin class found in the templates. The method 'recon' identifies the malware. - Place all necessary code here to ensure effective data extraction. The method 'extract' performs the standard extraction process.

No Specific Format for Extracted Data

There is no specific format for the extracted data. However, it is advisable to store it in a Python dictionary. This approach allows output processors to read the data in a consistent manner. Processing - This is where you place classes that inherit from the OutputProcessor class.

They are invoked after the data extraction process

They are invoked after the data extraction process and retrieve the extracted information. The process method takes
 

Maldrolyzer Reviews

Write a Review

No reviews yet. Be the first to review this tool!

Write a Review

Share your experience with Maldrolyzer tool and help others make informed decisions.

Featured

Specops Software
Free

Specops Software View Specops Software

Specops Software empowers organizations to fortify their IT security by addressing the critical vulnerability of password management and authentication. As a premier vendor, Specops Software provides advanced solutions designed to proactively block weak passwords, enforce robust authentication protocols, and ensure compliance with stringent industry standards like CJIS and HITRUST. With deep native integration into Active Directory and on-premises data storage, Specops Software offers unparalleled security and control for sensitive business data.

Active Directory password policy auditing against compliance standards
Breached password detection for over 900 million known compromised passwords
Zero-trust access evaluation and enhancement
Infisical
Free

Infisical View Infisical

Infisical is the premier open-source platform designed for unified management of secrets, certificates, and configurations across your entire organization. It seamlessly integrates into your development workflows, CI/CD pipelines, and cloud infrastructure, ensuring secure storage and automated injection of sensitive information. Empower your team with robust features like versioning, point-in-time recovery, comprehensive audit logging, and automated secret rotation for enhanced security and operational efficiency.

Open-source secrets management platform
Unified management of secrets, certificates, and configs
Seamless integration with development workflows and CI/CD
Click Studios
Free

Click Studios View Click Studios

Click Studios is an Australian-based Agile software development company dedicated to evolving Passwordstate, their robust Enterprise Password Management solution. Continuously refined through customer insights and cybersecurity advancements, Passwordstate offers advanced features for secure sensitive information management and stringent compliance. Click Studios provides scalable, secure, and user-friendly password management solutions, empowering businesses globally with affordable and reliable access control.

Secure Enterprise Password Management
Continuous Feature Enhancement
Customer Feedback Driven Development

Similar Tools

Parrot Security (ParrotSec)
Free

Parrot Security (ParrotSec) View Parrot Security (ParrotSec)

Parrot Security OS (ParrotSec) is a specialized operating system engineered for comprehensive penetration testing and advanced Red Team operations. It offers an extensive collection of pre-installed tools, utilities, and libraries, empowering security professionals to conduct reliable, compliant, and reproducible assessments of digital assets. From initial reconnaissance through in-depth analysis to final reporting, ParrotSec provides a highly flexible and potent environment designed to cover the entire security assessment lifecycle.

Comprehensive penetration testing suite
Advanced Red Team capabilities
Extensive library of security tools
Kali Linux
Free

Kali Linux View Kali Linux

Kali Linux is a leading Debian-based open-source operating system meticulously engineered for advanced information security professionals. It offers a comprehensive suite of pre-installed tools and utilities for penetration testing, security research, digital forensics, and reverse engineering, enabling IT and security teams to efficiently and effectively assess system vulnerabilities from initial reconnaissance to final reporting. Kali Linux significantly streamlines the setup and configuration process, allowing professionals to deploy and utilize powerful security tools immediately, optimizing workflows and enhancing operational readiness.

Extensive collection of security tools
Debian-based for stability and compatibility
Optimized for rapid deployment and use
Ransomware Help
Free

Ransomware Help View Ransomware Help

Ransomware Help is your expert partner in swift and secure ransomware recovery, minimizing business disruption and data loss with advanced decryption and forensic techniques. Our certified professionals leverage cutting-edge technology and a meticulous approach to restore your critical data and fortify your defenses against future cyber threats through comprehensive consulting and backup solutions.

Rapid Ransomware Decryption Services
Certified Data Recovery Experts
State-of-the-Art Recovery Technology
Phylum
Free

Phylum View Phylum

Phylum, now part of Veracode, delivers automated software supply chain risk analysis, safeguarding organizations by proactively identifying and mitigating threats within open-source packages. Our solution offers comprehensive coverage across multiple languages, integrating seamlessly into CI/CD pipelines to enable policy-driven automation and the complete blocking of malicious or vulnerable packages, thereby empowering secure innovation.

Automated open-source package risk analysis
Immediate threat identification upon publication
Policy-driven risk management automation
Metasploit
Free

Metasploit View Metasploit

Metasploit is the industry-leading open-source penetration testing platform, empowering security professionals to discover, exploit, and validate vulnerabilities with precision and efficiency. Its comprehensive framework provides a robust environment for developing and executing exploit code, managing security assessments, and enhancing defensive strategies through IDS signature development and anti-forensic techniques. Trusted globally, Metasploit accelerates your security testing lifecycle and strengthens your organization's defenses against emerging threats.

Extensive exploit module library
Vulnerability scanning and validation
Payload generation and management
ANY.RUN
Free

ANY.RUN View ANY.RUN

ANY.RUN is a cutting-edge interactive sandbox designed for comprehensive dynamic and static malware analysis. It empowers security professionals to dissect cyber threats by providing real-time visibility into process creation and execution during simulated environments. Unlike purely automated tools, ANY.RUN's interactive approach offers a robust and detailed understanding of malware behavior, crucial for effective threat intelligence and defense strategies.

Interactive Malware Sandbox
Real-time Process Monitoring
Dynamic & Static Analysis