QuasarRAT analysis tools and research report
☆29Dec 22, 2023Updated 2 years ago
Alternatives and similar repositories for QuasarRAT-Analysis
Users that are interested in QuasarRAT-Analysis are comparing it to the libraries listed below
Sorting:
- ☆16May 22, 2014Updated 11 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Work in Progress repo☆15Apr 18, 2019Updated 6 years ago
- This is a repository for reporting any issues in any of my software☆13May 15, 2018Updated 7 years ago
- A modified fork of Be.HexEditor for use in debug tools☆15Jan 5, 2022Updated 4 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 4 years ago
- A Golang Registry parser☆19Feb 3, 2025Updated last year
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Nov 16, 2018Updated 7 years ago
- Get USB Devices from Registry hives☆22Nov 15, 2021Updated 4 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- Simple utility to watch directory change notifications on a given path☆20Oct 6, 2017Updated 8 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- ☆21May 8, 2022Updated 3 years ago
- Put an end to curl | bash with this one weird trick☆17Oct 24, 2015Updated 10 years ago
- ☆20Jan 10, 2025Updated last year
- Library of threat hunts to get any user started!☆49Sep 4, 2020Updated 5 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Apr 9, 2019Updated 6 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- iknowthis Linux SystemCall Fuzzer☆20Apr 18, 2019Updated 6 years ago
- Library to process OLE compound file format. This is a work in progress and was initially written for jumplist parsing (for which it does…☆19Feb 2, 2025Updated last year
- This repo generally for malware Researcher ("Password: infected")☆19Updated this week
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- Fuzzy Hash calculated from import API of PE files☆90Aug 26, 2022Updated 3 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Windows symbol tables for Volatility 3☆93Jul 11, 2024Updated last year
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 2 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Using Zydis and LLVM to lift unsupported instructions to LLVM-IR☆30Jul 30, 2021Updated 4 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Jul 8, 2022Updated 3 years ago