Configuration Extractors for Malware
☆125Apr 23, 2025Updated last year
Alternatives and similar repositories for Configuration_extractors
Users that are interested in Configuration_extractors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDA Python scripts☆42Apr 11, 2025Updated last year
- ☆35Jan 13, 2026Updated 3 months ago
- Repository of Yara Rules☆143Updated this week
- IOCs and notes related to malware☆27Jul 7, 2025Updated 9 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- Malware Configuration Extraction Modules☆50Nov 25, 2023Updated 2 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆172Apr 13, 2026Updated 2 weeks ago
- ☆15Nov 25, 2021Updated 4 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆39Feb 18, 2023Updated 3 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Maco - Malware config extractor framework☆47Apr 17, 2026Updated 2 weeks ago
- Rules shared by the community from 100 Days of YARA 2024☆90Jan 1, 2025Updated last year
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- JPCERT/CC public YARA rules repository☆111Mar 9, 2026Updated last month
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- ☆28Oct 15, 2025Updated 6 months ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆27Nov 26, 2024Updated last year
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆517Aug 14, 2025Updated 8 months ago
- ☆128Updated this week
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆78Feb 19, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- ConfuserEx2 String Decryptor & Full Deobfuscation Guide☆103Aug 5, 2024Updated last year
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 5 years ago
- Volatility plugin for extracts configuration data of known malware☆494Dec 22, 2023Updated 2 years ago
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- ☆138Apr 20, 2023Updated 3 years ago
- ☆27Jul 11, 2022Updated 3 years ago