MalwareCantFly / Vba2Graph
Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.
☆278Updated 3 years ago
Alternatives and similar repositories for Vba2Graph:
Users that are interested in Vba2Graph are comparing it to the libraries listed below
- A VBA p-code disassembler☆467Updated 3 years ago
- Python script to decode common encoded PowerShell scripts☆216Updated 6 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆281Updated 7 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆96Updated last week
- Allows you to quickly query a Windows machine for RAM artifacts☆221Updated 4 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆264Updated 3 years ago
- VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls☆149Updated 9 years ago
- ☆134Updated 6 years ago
- Query and report user logons relations from MS Windows Security Events☆242Updated 6 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 2 years ago
- A modern Python-3-based alternative to RegRipper☆194Updated 3 weeks ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆109Updated 4 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Reconstruct process trees from event logs☆147Updated 4 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- ☆151Updated 6 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆117Updated 10 months ago
- Miscellaneous Malware RE☆195Updated 2 years ago
- Differential Analysis of Malware in Memory☆211Updated 8 years ago
- snake - a malware storage zoo☆216Updated last year
- ☆350Updated 4 years ago
- ☆276Updated 2 years ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆261Updated 3 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- A tool for detecting VBA stomping.☆100Updated 2 years ago
- Set of Yara rules for finding files using magics headers☆137Updated 4 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆192Updated last month
- Windows Live Artifacts Acquisition Script☆186Updated 2 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆467Updated 4 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 7 years ago