OALabs / frida-wshookView external linksLinks
Script analysis tool based on Frida.re
☆130May 31, 2017Updated 8 years ago
Alternatives and similar repositories for frida-wshook
Users that are interested in frida-wshook are comparing it to the libraries listed below
Sorting:
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆114Mar 2, 2017Updated 8 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆42Sep 18, 2018Updated 7 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- IDA python plugin to scan binary with Yara rules☆180Jan 30, 2024Updated 2 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- OLE Package Format Documentation☆22Jun 13, 2020Updated 5 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Jan 25, 2019Updated 7 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆479Jun 16, 2023Updated 2 years ago
- yara rules for cryptography detection☆30Apr 28, 2014Updated 11 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- Malware dynamic instrumentation tool based on frida framework☆110Jun 7, 2020Updated 5 years ago
- ☆39Mar 31, 2021Updated 4 years ago
- A CrackMe powered with a virtual machine.☆43Apr 13, 2015Updated 10 years ago
- ☆153Dec 6, 2018Updated 7 years ago
- A tool for studying JavaScript malware.☆667Nov 22, 2024Updated last year
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Yara sort☆13Updated this week
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- A tiny tool to learn the assembly code☆12Feb 17, 2017Updated 8 years ago
- ☆11Apr 13, 2017Updated 8 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- ☆82Jul 23, 2019Updated 6 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Sep 23, 2023Updated 2 years ago
- analysis of visual basic code☆46Mar 25, 2018Updated 7 years ago
- 生成frida框架hook java的js代码☆88Sep 24, 2017Updated 8 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Nov 25, 2023Updated 2 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- ☆24Jul 6, 2018Updated 7 years ago
- ☆142Apr 21, 2017Updated 8 years ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆12Aug 4, 2024Updated last year
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago