MalwareCantFly / Vba2Graph
Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.
☆275Updated 3 years ago
Alternatives and similar repositories for Vba2Graph:
Users that are interested in Vba2Graph are comparing it to the libraries listed below
- Allows you to quickly query a Windows machine for RAM artifacts☆218Updated 4 years ago
- Python script to decode common encoded PowerShell scripts☆215Updated 6 years ago
- A VBA p-code disassembler☆459Updated 3 years ago
- ☆274Updated last year
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆264Updated 3 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆93Updated this week
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆279Updated 7 years ago
- snake - a malware storage zoo☆217Updated last year
- VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls☆146Updated 8 years ago
- Lazy Office Analyzer☆119Updated 7 years ago
- ☆348Updated 3 years ago
- ☆150Updated 6 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆115Updated 8 months ago
- Query and report user logons relations from MS Windows Security Events☆241Updated 6 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆288Updated 7 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- Reconstruct process trees from event logs☆146Updated 4 years ago
- ☆419Updated last year
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 5 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆81Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆157Updated 2 years ago
- Automatic Yara Rule Generation☆331Updated 8 years ago
- ☆134Updated 6 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆464Updated 3 years ago
- Windows Live Artifacts Acquisition Script☆186Updated 2 years ago
- A tool for de-obfuscating PowerShell scripts☆67Updated 5 years ago
- Set of Yara rules for finding files using magics headers☆136Updated 4 years ago
- Page File analysis tools.☆124Updated 9 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆192Updated 4 years ago