Malandrone / PowerDecodeLinks
PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs code dynamic analysis, extracting malware hosting URLs and checking http response.It can also detect if the malware attempts to inject shellcode into memory.
☆229Updated last year
Alternatives and similar repositories for PowerDecode
Users that are interested in PowerDecode are comparing it to the libraries listed below
Sorting:
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- ☆214Updated 2 months ago
- Dump quarantined files from Windows Defender☆73Updated 3 years ago
- A collection of tools, scripts and personal research☆155Updated this week
- Repository of Yara Rules☆139Updated 3 weeks ago
- Collection of Volatility2 profiles, generated against Linux kernels.☆54Updated 3 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆215Updated this week
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated 3 months ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆203Updated 4 months ago
- A collection of tools and detections for the Sliver C2 Frameworj☆133Updated 2 years ago
- ☆250Updated 8 months ago
- RegRipper4.0☆81Updated last month
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆226Updated 2 years ago
- ☆260Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆168Updated last year
- ☆173Updated 2 years ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆310Updated 2 years ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆143Updated this week
- Windows symbol tables for Volatility 3☆92Updated last year
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆492Updated last month
- Python tool to check rootkits in Windows kernel☆207Updated 5 months ago
- A repository for additional files related to the book Windows Security Internals with PowerShell from No Starch Press.☆219Updated 5 months ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆693Updated 3 months ago
- Memory acquisition for Linux that makes sense.☆219Updated 2 years ago
- A curated list of ressources for Volatility 2 & 3☆13Updated last year
- Volatility3 Linux profiles☆74Updated 2 months ago
- Powershell Linter☆86Updated 2 months ago
- ☆520Updated 2 years ago
- Somes tools and scripts☆153Updated 4 years ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 5 years ago