BrunoMCBraga / VBA-Macros-Events-Cheat-Sheet
Cheat-Sheet with events too look out for when analysing malicious Office documents
☆19Updated 6 years ago
Related projects: ⓘ
- Making shellcode UD - https://osandamalith.com☆25Updated 8 years ago
- ☆10Updated this week
- ☆15Updated this week
- A simple reflective dll example☆18Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 7 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆52Updated 6 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆17Updated 3 years ago
- ☆24Updated 6 years ago
- Removal of certain event logs within a Windows OS☆7Updated 5 years ago
- My manual analysis of malware families☆13Updated 7 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆22Updated 7 years ago
- Analysis PE file or Shellcode☆48Updated 8 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 4 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 6 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆14Updated 9 years ago
- ☆17Updated 6 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆60Updated 7 years ago
- ☆23Updated 5 years ago
- ☆41Updated 6 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- API functions for Malware Research☆35Updated 5 years ago
- ☆26Updated this week
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 8 years ago