AllsafeCyberSecurity / malware-analysis-at-scale-defeating-emotet-by-ghidraView external linksLinks
Ghidra Script for automated analysis of EMOTET
☆17Feb 3, 2021Updated 5 years ago
Alternatives and similar repositories for malware-analysis-at-scale-defeating-emotet-by-ghidra
Users that are interested in malware-analysis-at-scale-defeating-emotet-by-ghidra are comparing it to the libraries listed below
Sorting:
- Make the Windows API in Ghidra easy to read and informative.☆28Jan 10, 2022Updated 4 years ago
- Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as se…☆13Oct 29, 2019Updated 6 years ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- for Windows Malware Analysis☆15May 14, 2020Updated 5 years ago
- My analysis of the malware known as "KSGrabber"☆14Sep 25, 2021Updated 4 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- ☆25Mar 22, 2023Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- ☆33Feb 26, 2022Updated 3 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Sep 1, 2025Updated 5 months ago
- Graphoscope is a solution to access multiple independent data sources from a common UI and show data relations as a graph☆41Sep 25, 2025Updated 4 months ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Provides a Learning Tools Interoperability (LTI) integration for creating WordPress blogs with appropriate user roles based on roles set …☆12Mar 17, 2025Updated 11 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- Repository for the Oulu University Security Engineering course.☆13Sep 12, 2025Updated 5 months ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 5 months ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 2 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated 2 weeks ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated 3 weeks ago
- TA505 unpacker Python 2.7☆46Jun 22, 2020Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Apr 30, 2023Updated 2 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 3 months ago
- SSH Bruteforce Basic Script created with C++ to Linux☆10Jan 28, 2023Updated 3 years ago