Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)
☆585May 5, 2024Updated last year
Alternatives and similar repositories for XLMMacroDeobfuscator
Users that are interested in XLMMacroDeobfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A VBA parser and emulation engine to analyze malicious macros.☆1,118Jul 10, 2024Updated last year
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,313Feb 14, 2026Updated last month
- Windows kernel and user mode emulation.☆1,933Updated this week
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- Dynamic unpacker based on PE-sieve☆803Apr 1, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- ☆1,133Dec 19, 2023Updated 2 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,732Mar 21, 2026Updated 3 weeks ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Sep 23, 2020Updated 5 years ago
- Quickly debug shellcode extracted during malware analysis☆631May 23, 2023Updated 2 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Please no pull requests for this repository. Thanks!☆2,440Mar 16, 2026Updated 3 weeks ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool for detecting VBA stomping.☆102Aug 4, 2022Updated 3 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,334Updated this week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,606Updated this week
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated 2 months ago
- A VBA p-code disassembler☆486Jun 12, 2021Updated 4 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,283Mar 26, 2026Updated 2 weeks ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,959Apr 2, 2026Updated last week
- PowerShell script for deobfuscating encoded PowerShell scripts☆437Feb 4, 2021Updated 5 years ago
- Malduck is your ducky companion in malware analysis journeys☆350Jun 22, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- a vba pcode decompiler based on pcodedmp☆114Sep 15, 2021Updated 4 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,940Updated this week
- YARA signature and IOC database for my scanners and tools☆2,910Updated this week
- Malware Configuration And Payload Extraction☆3,117Updated this week
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.☆166Oct 24, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- c2 traffic☆196Feb 6, 2023Updated 3 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆704Apr 1, 2026Updated last week
- Malware samples, analysis exercises and other interesting resources.☆1,623Jan 13, 2024Updated 2 years ago
- A golang CLI tool to download malware from a variety of sources.☆151Jul 3, 2025Updated 9 months ago
- ☆15Nov 25, 2021Updated 4 years ago
- yarGen is a generator for YARA rules☆1,783Jan 10, 2026Updated 3 months ago
- A list of cyber-chef recipes and curated links☆2,200Jun 14, 2024Updated last year