Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)
☆585May 5, 2024Updated last year
Alternatives and similar repositories for XLMMacroDeobfuscator
Users that are interested in XLMMacroDeobfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,326Feb 14, 2026Updated 2 months ago
- Windows kernel and user mode emulation.☆1,949Apr 8, 2026Updated 3 weeks ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Apr 23, 2026Updated last week
- Dynamic unpacker based on PE-sieve☆809Apr 14, 2026Updated 2 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- ☆1,134Dec 19, 2023Updated 2 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,768Apr 16, 2026Updated 2 weeks ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Sep 23, 2020Updated 5 years ago
- Quickly debug shellcode extracted during malware analysis☆634May 23, 2023Updated 2 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Please no pull requests for this repository. Thanks!☆2,459Apr 19, 2026Updated last week
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A tool for detecting VBA stomping.☆102Aug 4, 2022Updated 3 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,349Apr 18, 2026Updated 2 weeks ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,646Apr 18, 2026Updated 2 weeks ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated 2 months ago
- A VBA p-code disassembler☆486Jun 12, 2021Updated 4 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,288Apr 17, 2026Updated 2 weeks ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,982Apr 23, 2026Updated last week
- PowerShell script for deobfuscating encoded PowerShell scripts☆438Feb 4, 2021Updated 5 years ago
- Malduck is your ducky companion in malware analysis journeys☆350Jun 22, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- a vba pcode decompiler based on pcodedmp☆114Sep 15, 2021Updated 4 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,982Updated this week
- YARA signature and IOC database for my scanners and tools☆2,931Updated this week
- Malware Configuration And Payload Extraction☆3,165Updated this week
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Oct 26, 2022Updated 3 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆391May 11, 2022Updated 3 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.☆167Oct 24, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- c2 traffic☆196Feb 6, 2023Updated 3 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,630Jan 13, 2024Updated 2 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆712Apr 1, 2026Updated last month
- A golang CLI tool to download malware from a variety of sources.☆151Jul 3, 2025Updated 9 months ago
- ☆15Nov 25, 2021Updated 4 years ago
- yarGen is a generator for YARA rules☆1,786Jan 10, 2026Updated 3 months ago
- A list of cyber-chef recipes and curated links☆2,202Jun 14, 2024Updated last year