KuechA / pestudio-cliLinks
Python tool to analyze PE file for patterns used by malware
☆26Updated 3 years ago
Alternatives and similar repositories for pestudio-cli
Users that are interested in pestudio-cli are comparing it to the libraries listed below
Sorting:
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Updated 6 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 4 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 2 months ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆21Updated 3 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆47Updated 4 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- ☆20Updated 3 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆48Updated 11 months ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- Python script to automatically deobfuscate malware code☆59Updated 7 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Updated 4 years ago
- Malware captured with honeypots☆38Updated 8 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated last year
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆70Updated 4 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- A Python malware analysis library.☆50Updated 2 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- Userland API monitor for threat hunting☆58Updated 5 years ago
- ProcDot Malware Sandbox☆25Updated 4 months ago
- ☆35Updated 4 years ago
- Capture BAT is a behavioral analysis tool of applications for the Win32 operating system family.☆32Updated 12 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Updated 5 years ago
- ☆24Updated last year
- Sources Codes of many MSIL malwares☆24Updated 3 years ago