☆27Nov 26, 2024Updated last year
Alternatives and similar repositories for Config-Extractors
Users that are interested in Config-Extractors are comparing it to the libraries listed below
Sorting:
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆42Feb 18, 2023Updated 3 years ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- Python Library for ConfigExtractor☆15Feb 24, 2026Updated last week
- ☆35Jan 13, 2026Updated last month
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- ☆31Nov 28, 2023Updated 2 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- ☆25Jan 8, 2024Updated 2 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 10 months ago
- Simple PoC causing overflow☆19Oct 11, 2023Updated 2 years ago
- A collection of beautified and commented samples of malware implemented in Bash☆21Apr 4, 2023Updated 2 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- ☆37Mar 3, 2025Updated last year
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 4 months ago
- ☆18Mar 26, 2024Updated last year
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- a common schema for internet-connected service discovery 🔎 📚☆23Jan 29, 2026Updated last month
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 3 months ago
- ☆27Feb 3, 2026Updated last month
- A utility to fix intentionally corrupted UPX packed files.☆93May 22, 2023Updated 2 years ago
- dontpopme bitches☆23Jun 16, 2022Updated 3 years ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 8 months ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆119Apr 8, 2023Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 2 years ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- An IDA plugin which demangles Rust function names☆35Dec 11, 2023Updated 2 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22May 19, 2022Updated 3 years ago