Configuration Extractors for Malware
☆124Apr 23, 2025Updated 10 months ago
Alternatives and similar repositories for Configuration_extractors
Users that are interested in Configuration_extractors are comparing it to the libraries listed below
Sorting:
- IDA Python scripts☆42Apr 11, 2025Updated 10 months ago
- ☆35Jan 13, 2026Updated last month
- Repository of Yara Rules☆139Feb 16, 2026Updated last week
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Updated this week
- IOCs and notes related to malware☆27Jul 7, 2025Updated 7 months ago
- ☆27Nov 26, 2024Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- JPCERT/CC public YARA rules repository☆109Nov 14, 2025Updated 3 months ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆117Apr 4, 2023Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆42Feb 18, 2023Updated 3 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Nov 25, 2023Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 4 months ago
- This repository contains a few leaked files of HookBot.☆107Jul 22, 2023Updated 2 years ago
- ☆28Oct 15, 2025Updated 4 months ago
- ☆23Dec 15, 2022Updated 3 years ago
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆507Aug 14, 2025Updated 6 months ago
- ☆34Nov 11, 2025Updated 3 months ago
- ConfuserEx2 String Decryptor & Full Deobfuscation Guide☆99Aug 5, 2024Updated last year
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- 免杀木马样本☆103Oct 11, 2025Updated 4 months ago
- Python Library for ConfigExtractor☆15Updated this week
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- Create a lnk shortcut file for Windows☆24Apr 23, 2019Updated 6 years ago
- ☆127Updated this week
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆72Jan 6, 2026Updated last month
- An x64dbg plugin which helps make sense of long C++ symbols☆59May 12, 2023Updated 2 years ago