Various snippets created during malware analysis
☆22Apr 29, 2018Updated 7 years ago
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below
Sorting:
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- ☆14Oct 25, 2022Updated 3 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- ☆11Mar 12, 2021Updated 5 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Please see other maintained fork:☆17Dec 4, 2025Updated 3 months ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- A tool designed to correlate evidence obtained from IoT devices☆11Nov 6, 2020Updated 5 years ago
- A tool for studying JavaScript malware.☆15Mar 6, 2026Updated 2 weeks ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- A pure Perl HTTP proxy☆19May 14, 2020Updated 5 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 8 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 6 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Understanding ATT&CK Matrix for Enterprise☆79May 16, 2018Updated 7 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago