IcedID Decryption Tool
☆28May 7, 2021Updated 4 years ago
Alternatives and similar repositories for IcedDecrypt
Users that are interested in IcedDecrypt are comparing it to the libraries listed below
Sorting:
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- ☆537Feb 19, 2026Updated last week
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- ☆15Oct 3, 2024Updated last year
- A tool for studying JavaScript malware.☆15Updated this week
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- ☆15Oct 24, 2018Updated 7 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- ☆18Mar 26, 2024Updated last year
- Automatically exported from code.google.com/p/narly☆24Jul 11, 2021Updated 4 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- My collection of self-written exploits☆24Mar 25, 2022Updated 3 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- Use Markov Chains to obfuscate data as other data☆54Aug 3, 2016Updated 9 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 2 months ago
- ☆83Jan 31, 2020Updated 6 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- ☆27Nov 26, 2024Updated last year
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- EditBox is a plugin for the Volatility Framework. It extracts the text from Windows Edit controls, that is, textboxes as generated by Win…☆24Jun 4, 2017Updated 8 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Yet another rule generator for Yara☆29Jun 6, 2025Updated 8 months ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆110Jan 26, 2021Updated 5 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22May 19, 2022Updated 3 years ago
- A simple and scalable Android bot emulation framework, as presented at Black Hat Europe 2021's Arsenal, as well as atHack 2021's Arsenal☆28Nov 8, 2021Updated 4 years ago
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 3 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- YARA Language Server☆74Feb 3, 2026Updated 3 weeks ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Feb 28, 2018Updated 8 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago