Configuration Extractors for Malware
☆125Apr 23, 2025Updated 10 months ago
Alternatives and similar repositories for Configuration_extractors
Users that are interested in Configuration_extractors are comparing it to the libraries listed below
Sorting:
- IDA Python scripts☆42Apr 11, 2025Updated 11 months ago
- ☆35Jan 13, 2026Updated 2 months ago
- Repository of Yara Rules☆141Updated this week
- IOCs and notes related to malware☆27Jul 7, 2025Updated 8 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 4 months ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Updated this week
- ☆15Nov 25, 2021Updated 4 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Feb 18, 2023Updated 3 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Maco - Malware config extractor framework☆45Mar 13, 2026Updated last week
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- JPCERT/CC public YARA rules repository☆109Mar 9, 2026Updated last week
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- ☆28Oct 15, 2025Updated 5 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- Collection of generic YARA rules☆16Updated this week
- ☆27Nov 26, 2024Updated last year
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆512Aug 14, 2025Updated 7 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- ☆127Mar 7, 2026Updated 2 weeks ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Updated this week
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆73Feb 19, 2026Updated last month
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- ConfuserEx2 String Decryptor & Full Deobfuscation Guide☆99Aug 5, 2024Updated last year
- ☆71Jan 1, 2026Updated 2 months ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago