Various snippets created during malware analysis
☆22Apr 29, 2018Updated 7 years ago
Alternatives and similar repositories for malware_analysis
Users that are interested in malware_analysis are comparing it to the libraries listed below
Sorting:
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- A tool for studying JavaScript malware.☆15Updated this week
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- List of netblocks with shared hosting on 20170330☆10Apr 10, 2017Updated 8 years ago
- ☆23Mar 17, 2024Updated last year
- ☆15Jun 5, 2019Updated 6 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 12 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Please see other maintained fork:☆17Dec 4, 2025Updated 2 months ago
- Powershell & Python XOR 2 Files☆15Nov 22, 2018Updated 7 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- Event Tracing for Windows Custom Events☆21Jan 28, 2015Updated 11 years ago
- Windows Shortcut file (LNK) parser☆137Nov 17, 2022Updated 3 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Jul 20, 2023Updated 2 years ago
- Automatically identify and extract potential anti-debugging techniques used by malware.☆27Nov 20, 2024Updated last year
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- ☆53May 21, 2018Updated 7 years ago
- Extract data of TTD trace file to a minidump☆31Jul 31, 2023Updated 2 years ago