DissectMalware / xlrd2
xlrd2 is a variant of xlrd that is actively maintained
☆23Updated 6 months ago
Alternatives and similar repositories for xlrd2:
Users that are interested in xlrd2 are comparing it to the libraries listed below
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 3 weeks ago
- The hidden mstsc recorder player☆28Updated 4 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- an Excel 2007+ Binary Workbook (xlsb) parser for Python☆21Updated 2 years ago
- ☆13Updated 2 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆32Updated 4 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆43Updated last year
- The Multiplatform Linux Sandbox☆15Updated last year
- Help deobfuscate VBScript☆15Updated 2 years ago
- Python wrappers for mal_unpack☆35Updated last year
- Yara filetype plugin for Vim.☆14Updated 4 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- ☆22Updated 4 years ago
- ☆47Updated 5 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆22Updated 10 months ago
- Work in Progress repo☆14Updated 5 years ago
- Windows Event Log Knowledge Base☆22Updated 4 months ago
- ☆36Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Python emulator for Excel XLM macros.☆18Updated 4 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Repo to store Windows PE's and Utilities for easy access.☆16Updated 3 years ago
- ☆28Updated 3 months ago
- Generates YARA rules to detect malware using API hashing☆17Updated 3 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆31Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- module for certexfil☆15Updated 2 years ago