ANSSI-FR / bootcode_parser
A boot record parser that identifies known good signatures for MBR, VBR and IPL.
☆97Updated last week
Alternatives and similar repositories for bootcode_parser:
Users that are interested in bootcode_parser are comparing it to the libraries listed below
- ☆68Updated 7 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆142Updated 4 years ago
- zer0m0n driver for cuckoo sandbox☆87Updated 8 years ago
- PE Import Hash Generator☆75Updated 7 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- ☆44Updated 6 years ago
- ☆109Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Lazy Office Analyzer☆119Updated 8 years ago
- ☆134Updated 6 years ago
- Community modules for FAME☆65Updated 2 weeks ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 7 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆82Updated last year
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Modified edition of cuckoomon☆48Updated 6 years ago
- Comae Hibernation File Decompressor☆143Updated last year
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Simple NTFS crawler.☆56Updated 7 years ago
- Python interface to the CRITs API☆22Updated 7 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 5 years ago
- openioc_scan Volatility Framework plugin☆42Updated 8 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- Reconstruct process trees from event logs☆147Updated 4 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Your bag of handy codes for malware researchers☆121Updated 4 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Malware Repository Framework☆100Updated 6 years ago
- Cryptowall Tooling & Information☆34Updated 8 years ago