Malware Cookbook DVD Tools Online

For all the folks who bought DVD-less Kindle versions of the cookbook, all the folks who received a DVD with their paper copy but want updates to the tools, and even for folks who just want to experiment with the tools without buying the book, please feel free to download with an SVN client here:

In order by Chapter, here’s a quick description of what’s on the DVD. It also includes, the set of Volatility plugins for the upcoming 1.4 release, a bunch of sample memory dumps from malware infected systems, and full color images for screen shots in the book.

* Multi-platform TOR-enabled URL
* wwwhoney.tgz: CGI scripts to accept submissions from nepenthes and dionaea honeypots
* Convert ClamAV antivirus signatures to YARA rules
* Convert PEiD packer signatures to YARA rules
* Script to implement your own antivirus multi-scanner
* Detect malicious PE file attributes
* Detect self-mutating code on live Windows systems using ssdeep
* Command-line interface to VirusTotal, ThreatExpert, Jotti, and NoVirusThanks
* Malware artifacts database manager
* Application to scan live Windows systems for artifacts (files, Registry keys, mutexes) left by malware
* Create static PNG images of IP addresses plotted on a map using GeoIP
* Create dynamic/interactive geographical maps of IP addresses using Google charts
* Script to produce disassemblies (via DiStorm) of shellcode and optionally apply an XOR mask
* Python class for automating malware execution in VirtualBox and VMware guests
* Sample automation script for VirtualBox based on
* Sample automation script for VMware based on
* Python class for building sandboxes with support for analyzing network traffic, packet captures, and memory
* RegFsNotify.exe: Tool to detect changes to the Registry and file system in real time (from user mode without API hooks)
* HandleDiff.exe: Tool to detect changes to the handle tables of all processes on a system (useful to analyze the side-effects of code injecting malware)
* Kernel driver for monitoring notification routines, preventing processes from terminating, preventing files from being deleted, and preventing other drivers from loading
* cmd.exe: Custom command shell (cmd.exe) for logging malware activity and backdoor activity
* tsk-xview.exe: Cross-view based rootkit detection tool based on The Sleuth Kit API and Microsoft’s Offline Registry API
* HTMLInjection Detector.exe: Detect HTML injection attacks on banking and financial websites
* RegRipper plug-in for printing a computer’s routing table
* RegRipper plug-in for printing files that are pending deletion
* RegRipper plug-in for printing processes that malware prevents from running
* RegRipper plug-in for printing ShellExecute hooks (a method of DLL injection)
* Parse::Win32Registry module to extract and examine cryptography certificates stored in Registry hives
* Parse::Win32Registry module for finding hidden binary data in the Registry
* scloader.exe: Executable wrapper for launching shell code in a debugger
* Immunity Debugger PyCommand for finding shellcode in arbitrary binary files
* Immunity Debugger PyCommand for finding Inline-style user mode API hooks
* WinAppDbg plug-in for monitoring API calls, alerting on suspicious flags/parameters and producing an HTML report
* Python library for encoding/decoding XOR, including brute force methods and automated YARA signature generation
* Immunity Debugger PyCommand for assistance when rebuilding import tables with Import REconstructor
* Immunity Debugger PyCommand for cracking Kraken’s Domain Generation Algorithm (DGA)
* Immunity Debugger PyCommand for decrypting Silent Banker strings
* rundll32ex.exe: Extended version of rundll32.exe that allows you to run DLLs in other processes, call exported functions, and pass parameters
* install_svc.bat: Batch script for installing a service DLL (for dynamic analysis of the DLL)
* Python script for installing a service DLL and supplying optional arguments to the service
* Python script for converting a DLL into a standalone executable
* DriverEntryFinder: Kernel driver to find the correct address in kernel memory to set breakpoints for catching new drivers as they load
* Python script to convert WinDbg output into data that can be imported into IDA
* WinDbgNotify.txt: WinDbg script for identifying malicious notification routines

This entry was posted in Malware Analyst's Cookbook. Bookmark the permalink.

6 Responses to Malware Cookbook DVD Tools Online

  1. Pingback: RT @iMHLv2: Malware Cookbook D… | Xanda's Twitter Archive

  2. Pingback: Malware Analyst’s DVD | CyberHades

  3. Jane says:

    I can’t seem to find the book’s DVD. I purchased the Kindle version.

    Could someone please post a link? Thanks.

  4. mhl says:

    Jane, the link to the DVD tools is at the beginning of this blog post (

  5. Or says:

    “This project currently has no downloads.”

    can you please check it?

  6. mhl says:

    Don’t look in the Downloads section. Click the Source tab and you’ll see instructions on how to get the DVD contents.

Leave a Reply