MRGEffitas / scripts
Scripts created by MRG Effitas
☆42Updated 8 years ago
Alternatives and similar repositories for scripts:
Users that are interested in scripts are comparing it to the libraries listed below
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- ☆46Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- zer0m0n driver for cuckoo sandbox☆21Updated 9 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 8 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Volatility Plugins☆21Updated 9 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆37Updated 7 years ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- REST API based malware repository (abandoned)☆108Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- Cryptowall Tooling & Information☆34Updated 8 years ago
- ☆74Updated 2 years ago
- ripPE - section extractor and profiler for PE file analysis☆32Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆23Updated 9 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- Malware.lu tools☆63Updated 11 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- IDATACO IDA Pro Plugin☆47Updated 8 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Malware.lu configuration extractor☆24Updated 10 years ago
- Malware Repository Framework☆100Updated 6 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- Collection of my Python Scripts☆41Updated 4 years ago