Dump-GUY / CAPA_JsonConverLinks
Converts exported results of CAPA tool from .json format to another formats supporting by different tools.
☆22Updated 3 years ago
Alternatives and similar repositories for CAPA_JsonConver
Users that are interested in CAPA_JsonConver are comparing it to the libraries listed below
Sorting:
- ☆23Updated 5 years ago
- ☆18Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated last month
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- ☆23Updated 4 years ago
- Capa analysis importer for Ghidra.☆63Updated 4 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Updated 5 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Ghidra plugin for https://analyze.intezer.com☆72Updated 3 years ago
- ☆24Updated 6 years ago
- Help deobfuscate VBScript☆16Updated 3 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 4 years ago
- Go Lang Portable Executable Parser☆38Updated 4 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- ☆36Updated 6 years ago
- ☆12Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58Updated 4 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- ☆73Updated 2 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- Yaras Random☆22Updated 6 years ago