Malandrone / PowerDecodeLinks
PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs code dynamic analysis, extracting malware hosting URLs and checking http response.It can also detect if the malware attempts to inject shellcode into memory.
☆226Updated last year
Alternatives and similar repositories for PowerDecode
Users that are interested in PowerDecode are comparing it to the libraries listed below
Sorting:
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- ☆211Updated last week
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆206Updated last week
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆251Updated last month
- Dump quarantined files from Windows Defender☆74Updated 3 years ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆199Updated 2 months ago
- A collection of tools, scripts and personal research☆146Updated 4 months ago
- Repository of Yara Rules☆131Updated this week
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆223Updated 2 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆133Updated 2 years ago
- ☆246Updated 6 months ago
- Collection of Volatility2 profiles, generated against Linux kernels.☆53Updated last month
- RegRipper4.0☆74Updated 2 weeks ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆167Updated last year
- ☆167Updated 2 years ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆296Updated 2 years ago
- ☆257Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆139Updated 3 weeks ago
- A curated list of ressources for Volatility 2 & 3☆12Updated last year
- Memory acquisition for Linux that makes sense.☆213Updated 2 years ago
- Volatility3 Linux profiles☆68Updated last month
- Windows symbol tables for Volatility 3☆91Updated last year
- Elastic Security Labs releases☆81Updated 2 weeks ago
- A repository for additional files related to the book Windows Security Internals with PowerShell from No Starch Press.☆210Updated 3 months ago
- Powershell Linter☆86Updated 3 weeks ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆688Updated last month
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆240Updated last week
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆53Updated 5 years ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆470Updated 5 months ago
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆479Updated 4 months ago