Skip to content

Commit b0a5684

Browse files
author
Analysis Tools Bot
committed
Commit list
1 parent c598604 commit b0a5684

File tree

2 files changed

+34
-0
lines changed

2 files changed

+34
-0
lines changed

README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1717,6 +1717,8 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
17171717

17181718
- **ktool** :warning: — Fully cross-platform toolkit and library for MachO+Obj-C editing/analysis. Includes a cli kit, a curses GUI, ObjC header dumping, and much more.
17191719

1720+
- [Malcat](https://malcat.fr/) :copyright: — Hexadecimal editor and disassembler for malware analysis and binary file inspection. Supports over 50 file formats and multiple CPU architectures (x86/x64, MIPS, .NET, Python, VB p-code). Features rapid analysis, embedded file extraction, Yara signature scanning, anomaly detection, and Python scripting. Designed for malware analysts, SOC operators, incident responders, and CTF players.
1721+
17201722
- **Manalyze** :warning: — A static analyzer, which checks portable executables for malicious content.
17211723

17221724
- **mcsema** :warning: — Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode. It translates ("lifts") executable binaries from native machine code to LLVM bitcode, which is very useful for performing program analysis methods.
@@ -2228,6 +2230,8 @@ Kani verifies:
22282230

22292231
- **LunaSec** :warning: — Open Source AppSec platform that automatically notifies you the next time vulnerabilities like Log4Shell or node-ipc happen. Track your dependencies and builds in a centralized service.
22302232

2233+
- [Malcat](https://malcat.fr/) :copyright: — Hexadecimal editor and disassembler for malware analysis and binary file inspection. Supports over 50 file formats and multiple CPU architectures (x86/x64, MIPS, .NET, Python, VB p-code). Features rapid analysis, embedded file extraction, Yara signature scanning, anomaly detection, and Python scripting. Designed for malware analysts, SOC operators, incident responders, and CTF players.
2234+
22312235
- [njsscan](https://opensecurity.in) — A static application testing (SAST) tool that can find insecure code patterns in your node.js applications using simple pattern matcher from libsast and syntax-aware semantic code pattern search tool semgrep.
22322236

22332237
- [NodeJSScan](https://opensecurity.in) — A static security code scanner for Node.js applications powered by libsast and semgrep that builds on the njsscan cli tool. It features a UI with various dashboards about an application's security status.

data/api/tools.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11486,6 +11486,36 @@
1148611486
"demos": null,
1148711487
"wrapper": null
1148811488
},
11489+
"malcat": {
11490+
"name": "Malcat",
11491+
"categories": [
11492+
"linter"
11493+
],
11494+
"languages": [],
11495+
"other": [
11496+
"binary",
11497+
"security"
11498+
],
11499+
"licenses": [
11500+
"proprietary"
11501+
],
11502+
"types": [
11503+
"gui"
11504+
],
11505+
"homepage": "https://malcat.fr/",
11506+
"source": null,
11507+
"pricing": null,
11508+
"plans": {
11509+
"free": true
11510+
},
11511+
"description": "Hexadecimal editor and disassembler for malware analysis and binary file inspection. Supports over 50 file formats and multiple CPU architectures (x86/x64, MIPS, .NET, Python, VB p-code). Features rapid analysis, embedded file extraction, Yara signature scanning, anomaly detection, and Python scripting. Designed for malware analysts, SOC operators, incident responders, and CTF players.",
11512+
"discussion": null,
11513+
"deprecated": null,
11514+
"resources": null,
11515+
"reviews": null,
11516+
"demos": null,
11517+
"wrapper": null
11518+
},
1148911519
"maligned": {
1149011520
"name": "maligned",
1149111521
"categories": [

0 commit comments

Comments
 (0)