CERT-Polska / karton-config-extractorLinks
Static configuration extractor for the Karton framework
☆10Updated 6 months ago
Alternatives and similar repositories for karton-config-extractor
Users that are interested in karton-config-extractor are comparing it to the libraries listed below
Sorting:
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Windows Event Log Knowledge Base☆26Updated 9 months ago
- Utilities for working with vivisect☆25Updated 4 months ago
- Royal Road RTF Weaponizer object decoder☆24Updated 9 months ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Updated 3 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆11Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Alternative YARA scanning engine☆70Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated 2 years ago
- Maco - Malware config extractor framework☆36Updated this week
- YARA Language Server☆71Updated last month
- Python wrappers for mal_unpack☆36Updated last year
- Yara rules written by me, for free use.☆19Updated 3 years ago
- ☆33Updated 3 years ago
- A library and cli tool to extract HWP files.☆22Updated 5 months ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆21Updated 3 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 5 months ago
- ☆24Updated last year
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆45Updated 3 years ago
- VirusTotal Intelligence Search☆38Updated 5 years ago
- ☆43Updated last year
- Go Lang Portable Executable Parser☆39Updated 4 years ago