Matmaus / LnkParse3Links
Windows Shortcut file (LNK) parser
☆112Updated last month
Alternatives and similar repositories for LnkParse3
Users that are interested in LnkParse3 are comparing it to the libraries listed below
Sorting:
- Dump quarantined files from Windows Defender☆73Updated 3 years ago
- Repository of Yara Rules☆133Updated last week
- A ProcessMonitor visualization application written in rust.☆183Updated 2 years ago
- Elastic Security Labs releases☆81Updated last month
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆224Updated 2 years ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆228Updated last year
- Collection of rules created using YARA-Signator over Malpedia☆142Updated last year
- ☆111Updated 3 months ago
- Powershell script deobfuscation using AST in Python☆72Updated 3 months ago
- Configuration Extractors for Malware☆121Updated 8 months ago
- RegRipper4.0☆76Updated 3 weeks ago
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- http://moaistory.blogspot.com/2018/10/winsearchdbanalyzer.html☆126Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆251Updated 2 months ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆75Updated last week
- YARA rule analyzer to improve rule quality and performance☆108Updated 8 months ago
- Windows symbol tables for Volatility 3☆91Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆87Updated last year
- ☆20Updated 3 years ago
- A python library to parse OneNote (.one) files☆141Updated last year
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆38Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆162Updated 10 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- ☆150Updated 2 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆208Updated last week
- ☆211Updated last month
- ☆249Updated 7 months ago
- A specification and style guide for YARA rules☆64Updated last year
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆144Updated 3 weeks ago
- ☆258Updated last year