9b / malpdfobjLinks
Builds json representation of PDF malware sample
☆52Updated 14 years ago
Alternatives and similar repositories for malpdfobj
Users that are interested in malpdfobj are comparing it to the libraries listed below
Sorting:
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆48Updated 8 years ago
- Malware Analysis Zoo☆25Updated 8 years ago
- a collection of public yara rules☆26Updated 5 years ago
- ☆16Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- A tool to download malwares☆16Updated 2 years ago
- Command-line Interface for Binar.ly☆38Updated 8 years ago
- ☆19Updated 6 years ago
- Volatility Plugins☆21Updated 10 years ago
- Lite version of PDF X-RAY that uses no backend☆36Updated 13 years ago
- This is a copy of the Registry Decoder Live repository from Google Code☆10Updated 9 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 11 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 9 years ago
- Shared yara rules☆30Updated 11 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- ☆28Updated 8 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Updated 9 years ago
- A collection of Yara rules I have created so far☆16Updated 4 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- Python OpenIOC Editor☆18Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- misc scripts☆36Updated 6 years ago
- Collection of my Python Scripts☆41Updated 4 years ago