Skip to content

xonoxitron/polymorph

Repository files navigation

PolyMorph Logo

PolyMorph

Open-source polyglot malware detector for APE, Zig, and WASM. Detect cross-platform threats, cryptominers, and evasion techniques that bypass traditional antivirus.

Rust License: MIT Security

FeaturesQuick StartExamples


🚨 The Polyglot Malware Problem

Modern malware exploits polyglot files - binaries valid in multiple formats simultaneously - to evade traditional antivirus.

The Threats

  • APE (Actually Portable Executable): Single binary runs on Windows/Linux/macOS/BSD
  • Zig Malware: Direct syscalls bypass EDR (Hell's Gate, Halo's Gate)
  • WASM Cryptominers: 75% of WASM modules are malicious (CrowdStrike, 2024)

Research Shows Defenses Fail

  • 20/36 detectors bypassed by polyglots (Jana & Shmatikov, 2012)
  • 90% evasion rate against VirusTotal for WASM (Cabrera-Arteaga, 2024)

No open-source tool detects APE + Zig + WASM together. PolyMorph fills this gap.


⚡ Quick Start

git clone https://github.com/xonoxitron/polymorph
cd polymorph
cargo build --release

# Scan a binary
./target/release/polymorph suspicious.exe

# JSON output
./target/release/polymorph --json malware.wasm

💻 Examples

See examples/ directory:

  • basic_scan.rs - Simple file scanning
  • batch_scan.rs - Multiple file processing

📚 Documentation


🤝 Contributing

Contributions welcome! See CONTRIBUTING.md


📜 License

MIT License - see LICENSE


Made with ❤️ by the security community

Report BugRequest Feature