Neo23x0 / ImpHash-Generator
PE Import Hash Generator
☆79Updated 7 years ago
Alternatives and similar repositories for ImpHash-Generator
Users that are interested in ImpHash-Generator are comparing it to the libraries listed below
Sorting:
- ☆82Updated 8 years ago
- Volatility plugins created by the author☆44Updated 9 years ago
- My Yara Rules Collection☆52Updated 9 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Python IOC Editor☆63Updated 10 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 4 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆117Updated 11 months ago
- Community modules for FAME☆65Updated 3 months ago
- YARA rules for use with ProcFilter☆86Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- ☆36Updated 8 years ago
- Web based Manager for Yara Rules☆57Updated 5 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆86Updated 7 years ago
- A collection of infosec related scripts and information.☆53Updated 7 months ago
- Ursnif beacon decryptor☆27Updated 2 years ago
- Random hunting ordiented yara rules☆96Updated 2 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆81Updated 3 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Repository of yara rules☆60Updated 2 years ago
- Page File analysis tools.☆127Updated 9 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- Reconstruct process trees from event logs☆146Updated 4 years ago
- Tools from WFA 4/e, timeline tools, etc.☆136Updated last year
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated 3 months ago
- A taxonomy and dictionary of malware behaviors.☆42Updated 5 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- Malware Repository Framework☆99Updated 7 years ago