RussianPanda95 / Configuration_extractors
Configuration Extractors for Malware
☆91Updated last month
Alternatives and similar repositories for Configuration_extractors:
Users that are interested in Configuration_extractors are comparing it to the libraries listed below
- Repository of Yara Rules☆100Updated 2 weeks ago
- A C# based tool for analysing malicious OneNote documents☆110Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- C2 Active Scanner☆52Updated 8 months ago
- ☆20Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆59Updated 2 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 6 months ago
- Yara Rules for Modern Malware☆73Updated last year
- ☆65Updated 2 years ago
- ☆64Updated last month
- Rules shared by the community from 100 Days of YARA 2024☆83Updated 2 months ago
- Contains compiled binaries of Volatility☆33Updated last month
- ☆30Updated last week
- ☆111Updated last week
- ☆36Updated 11 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆37Updated 2 months ago
- Powershell Linter☆50Updated 3 weeks ago
- Some of my Malware Analysis writeups.☆43Updated last year
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆44Updated 3 weeks ago
- A specification and style guide for YARA rules☆46Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 8 months ago
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆27Updated 3 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆38Updated 5 months ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Detection rule validation☆41Updated last year
- ☆80Updated 3 months ago