RussianPanda95 / Configuration_extractors
Configuration Extractors for Malware
☆86Updated this week
Alternatives and similar repositories for Configuration_extractors:
Users that are interested in Configuration_extractors are comparing it to the libraries listed below
- Yara Rules for Modern Malware☆73Updated 10 months ago
- Repository of Yara Rules☆97Updated last month
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- A C# based tool for analysing malicious OneNote documents☆110Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆75Updated 5 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆65Updated last year
- ☆20Updated last year
- C2 Active Scanner☆52Updated 7 months ago
- Contains compiled binaries of Volatility☆31Updated last week
- ☆36Updated 9 months ago
- ☆79Updated 2 months ago
- PowerShell Script Analyzer☆67Updated last year
- Powershell Linter☆50Updated 2 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆36Updated 4 months ago
- A collection of tools and detections for the Sliver C2 Frameworj☆115Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆83Updated this week
- Some of my Malware Analysis writeups.☆43Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆59Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- ☆27Updated this week
- ☆25Updated 2 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 2 months ago
- Detection rule validation☆41Updated last year
- Active C&C Detector☆152Updated last year
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- ☆22Updated this week
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- ☆26Updated 2 years ago