An open source script to perform malware static analysis on Portable Executable
☆332May 23, 2023Updated 2 years ago
Alternatives and similar repositories for PEpper
Users that are interested in PEpper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆281Nov 3, 2019Updated 6 years ago
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆120Jun 19, 2019Updated 6 years ago
- A static analyzer for PE executables.☆1,122Mar 11, 2026Updated last month
- CLI tool to analyze PE files☆90Sep 23, 2024Updated last year
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M …☆3,768Apr 16, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆624Aug 8, 2022Updated 3 years ago
- A machine learning tool that ranks strings based on their relevance for malware analysis.☆756Mar 11, 2026Updated last month
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆543Apr 14, 2021Updated 5 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,289Apr 17, 2026Updated 2 weeks ago
- Generating YARA rules based on binary code☆221Oct 7, 2021Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Aug 21, 2019Updated 6 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- Various snippets created during malware analysis☆466Oct 3, 2025Updated 6 months ago
- fireELF - Fileless Linux Malware Framework☆682Apr 17, 2019Updated 7 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆828Mar 10, 2022Updated 4 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,263Mar 26, 2026Updated last month
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆448Oct 26, 2022Updated 3 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Silencing Sysmon via driver unload☆238Oct 13, 2022Updated 3 years ago
- Digital forensic acquisition tool for Windows based incident response.☆348May 7, 2024Updated last year
- Ex-pv8's☆64Aug 28, 2019Updated 6 years ago
- ☆128May 22, 2023Updated 2 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,325Mar 31, 2026Updated last month
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…