DissectMalware / pyOneNote
A python library to parse OneNote (.one) files
☆129Updated 6 months ago
Alternatives and similar repositories for pyOneNote:
Users that are interested in pyOneNote are comparing it to the libraries listed below
- A C# based tool for analysing malicious OneNote documents☆109Updated last year
- YARA rule analyzer to improve rule quality and performance☆95Updated 3 weeks ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- A guide on how to write fast and memory friendly YARA rules☆127Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆83Updated 2 weeks ago
- Elastic Security Labs releases☆55Updated 2 months ago
- Carve file metadata from NTFS index ($I30) attributes☆62Updated 11 months ago
- The Windows Malware Analysis Reversing Core Tools☆90Updated 4 years ago
- Dump quarantined files from Windows Defender☆56Updated 2 years ago
- Python based CLI for MalwareBazaar☆36Updated 2 months ago
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- JPCERT/CC public YARA rules repository☆106Updated last month
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆110Updated 2 years ago
- Repository of Yara Rules☆96Updated 2 weeks ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆50Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- ☆103Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆111Updated last year
- Digital Forensics Artifacts Knowledge Base☆76Updated 8 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆51Updated 9 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆73Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆64Updated last year
- BlackBerry Threat Research & Intelligence☆96Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆82Updated this week
- Initial triage of Windows Event logs☆93Updated 7 months ago
- Collection of rules created using YARA-Signator over Malpedia☆120Updated 2 months ago
- ☆186Updated last week
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆124Updated last year