GlgApr/Malware-Analyzer

Automation Batch Malware Analyzer using Ghidra headlessAnalyzer

25
/ 100
Experimental

This tool helps security analysts and malware researchers automatically dissect large collections of suspicious files. It takes a directory full of malware samples (like executables, DLLs, or scripts) and systematically extracts crucial static features like API call entropy, function counts, and obfuscation scores. The output is a structured CSV dataset that can be used for training machine learning models or conducting further malware research.

No commits in the last 6 months.

Use this if you need to rapidly process numerous malware binaries to extract key characteristics for threat intelligence, malware family clustering, or creating datasets for AI-driven detection.

Not ideal if you need to understand runtime behavior of malware or analyze heavily packed samples without manual unpacking, as it focuses solely on static analysis.

malware-analysis threat-intelligence reverse-engineering cybersecurity-research binary-analysis
No License Stale 6m No Package No Dependents
Maintenance 2 / 25
Adoption 5 / 25
Maturity 7 / 25
Community 11 / 25

How are scores calculated?

Stars

12

Forks

2

Language

Java

License

Last pushed

Apr 29, 2025

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/GlgApr/Malware-Analyzer"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.