Josh Stroschein's Projects
This is a repository for a variety of academic projects
Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.
Python3 script that deobfuscates and then decodes base64 string that contains PowerShell script and extracts the URLs used to download Emotet binaries
These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help streamline the installation.
A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster visually similar images together. The script computes the Average Hash of each extracted image, then graphs the images if they meet the similarity threshold. The script can be used as a technique for visually identifying malware campaigns involving documents. To use the script, supply a directory containing OOXML files. If LibreOffice is in your PATH you can optionally convert non-OOXML Word, Excel, PowerPoint and Rich Text File documents to OOXML. The script outputs DOT files that can be exported as images using Graphviz. If Graphviz is in your PATH you can also export to an SVG (preferred) or PNG image.
This is a small Python3 script that allows you to search and download samples from Hybrid Analysis' v2 API
My personal repository
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to worry about handling live malware.
This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.
This repository contains sample code, projects and lab walk-throughs to help learn software exploitation.
Malware samples, analysis exercises and other interesting resources.
A collection of various signatures that I have either found or created, useful for malware analysis.
This repository contains programs for CSC 842.
A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode.
Python3 script that can download samples directly from Abuse.CH or via submitted URLs
Python3 script that wraps Shodan CLI - it resolves a domain to an IP and then performs a scan
SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data with optional output modules, such as Elastic.
Modular malware analysis artifact collection and correlation framework
Suricata git repository maintained by the OISF
A Burp Extension that parses emails from HTTP content and can optionally generate usernames.
This IDA Python plugin is intended to get you started creating IDA Plugins with Python, recognize the importance of deobfuscating strings and work on translating assembly to a higher-level language (i.e. Python).