FarghlyMal / Config-ExtractorsView external linksLinks
☆27Nov 26, 2024Updated last year
Alternatives and similar repositories for Config-Extractors
Users that are interested in Config-Extractors are comparing it to the libraries listed below
Sorting:
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Feb 18, 2023Updated 2 years ago
- Python Library for ConfigExtractor☆14Feb 4, 2026Updated last week
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- ☆35Jan 13, 2026Updated last month
- Collection of generic YARA rules☆16Aug 17, 2025Updated 5 months ago
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 8 months ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- ☆31Nov 28, 2023Updated 2 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 5 months ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Collection of scripts to automate the Malware Analysis process☆32Oct 27, 2025Updated 3 months ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- A collection of beautified and commented samples of malware implemented in Bash☆20Apr 4, 2023Updated 2 years ago
- Simple PoC causing overflow☆19Oct 11, 2023Updated 2 years ago
- ☆37Mar 3, 2025Updated 11 months ago
- ☆18Mar 26, 2024Updated last year
- ☆23Feb 3, 2021Updated 5 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- A utility to fix intentionally corrupted UPX packed files.☆93May 22, 2023Updated 2 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 7 months ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 2 years ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22May 19, 2022Updated 3 years ago
- Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)☆130Dec 16, 2024Updated last year
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆74Apr 18, 2024Updated last year
- Elastic Security Labs releases☆84Nov 24, 2025Updated 2 months ago
- This repo hosts an MCP server for volatility3.x☆38Jul 9, 2025Updated 7 months ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year