Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.
☆280Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for Vba2Graph
Users that are interested in Vba2Graph are comparing it to the libraries listed below
Sorting:
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Generating YARA rules based on binary code☆220Oct 7, 2021Updated 4 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆293Jun 27, 2017Updated 8 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- A static analyzer for PE executables.☆1,107Feb 24, 2026Updated last week
- ☆98Oct 7, 2020Updated 5 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆476Jun 16, 2023Updated 2 years ago
- A VBA p-code disassembler☆483Jun 12, 2021Updated 4 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Kaspersky's GReAT KLara☆732Jul 24, 2024Updated last year
- A tool for studying JavaScript malware.☆666Nov 22, 2024Updated last year
- snake - a malware storage zoo☆217Jul 11, 2023Updated 2 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆114Mar 2, 2017Updated 9 years ago
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆120Jun 19, 2019Updated 6 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- A function tracer☆92Jun 4, 2019Updated 6 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,295Feb 14, 2026Updated 2 weeks ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆265Jan 15, 2022Updated 4 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368May 21, 2024Updated last year
- A YARA-integrated process denial framework for Windows☆398Feb 15, 2020Updated 6 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Quickly debug shellcode extracted during malware analysis☆626May 23, 2023Updated 2 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Apr 8, 2021Updated 4 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆218Jul 17, 2020Updated 5 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆405Mar 3, 2024Updated 2 years ago