Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)
☆586May 5, 2024Updated 2 years ago
Alternatives and similar repositories for XLMMacroDeobfuscator
Users that are interested in XLMMacroDeobfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A VBA parser and emulation engine to analyze malicious macros.☆1,120Jul 10, 2024Updated last year
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,336Feb 14, 2026Updated 3 months ago
- Windows kernel and user mode emulation.☆1,967Updated this week
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Apr 23, 2026Updated 3 weeks ago
- Dynamic unpacker based on PE-sieve☆813Apr 14, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- ☆1,136Dec 19, 2023Updated 2 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,822Apr 16, 2026Updated last month
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Sep 23, 2020Updated 5 years ago
- Quickly debug shellcode extracted during malware analysis☆636May 23, 2023Updated 2 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- Please no pull requests for this repository. Thanks!☆2,472Apr 19, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool for detecting VBA stomping.☆102Aug 4, 2022Updated 3 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, …☆2,352Apr 18, 2026Updated last month
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,665May 3, 2026Updated 2 weeks ago
- YARA malware query accelerator (web frontend)☆439Feb 3, 2026Updated 3 months ago
- A VBA p-code disassembler☆487Jun 12, 2021Updated 4 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,290May 11, 2026Updated last week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆4,025Updated this week
- PowerShell script for deobfuscating encoded PowerShell scripts☆437Feb 4, 2021Updated 5 years ago
- Malduck is your ducky companion in malware analysis journeys☆352Jun 22, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- a vba pcode decompiler based on pcodedmp☆114Sep 15, 2021Updated 4 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆6,017Updated this week
- YARA signature and IOC database for my scanners and tools☆2,955May 8, 2026Updated 2 weeks ago
- Malware Configuration And Payload Extraction☆3,193May 13, 2026Updated last week
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆448Oct 26, 2022Updated 3 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆390May 11, 2022Updated 4 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.☆167Oct 24, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- c2 traffic☆196Feb 6, 2023Updated 3 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,635Jan 13, 2024Updated 2 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆714May 13, 2026Updated last week
- A golang CLI tool to download malware from a variety of sources.☆151Jul 3, 2025Updated 10 months ago
- ☆15Nov 25, 2021Updated 4 years ago
- yarGen is a generator for YARA rules☆1,788Jan 10, 2026Updated 4 months ago
- A list of cyber-chef recipes and curated links☆2,203Jun 14, 2024Updated last year