Configuration Extractors for Malware
☆125Apr 23, 2025Updated 11 months ago
Alternatives and similar repositories for Configuration_extractors
Users that are interested in Configuration_extractors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDA Python scripts☆42Apr 11, 2025Updated 11 months ago
- ☆35Jan 13, 2026Updated 2 months ago
- Repository of Yara Rules☆141Mar 16, 2026Updated 3 weeks ago
- IOCs and notes related to malware☆27Jul 7, 2025Updated 9 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 5 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Mar 23, 2026Updated 2 weeks ago
- ☆15Nov 25, 2021Updated 4 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆39Feb 18, 2023Updated 3 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Maco - Malware config extractor framework☆47Apr 2, 2026Updated last week
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- JPCERT/CC public YARA rules repository☆110Mar 9, 2026Updated last month
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- ☆28Oct 15, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collection of generic YARA rules☆16Mar 18, 2026Updated 3 weeks ago
- ☆27Nov 26, 2024Updated last year
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆511Aug 14, 2025Updated 7 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- ☆128Mar 7, 2026Updated last month
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆77Feb 19, 2026Updated last month
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- ConfuserEx2 String Decryptor & Full Deobfuscation Guide☆102Aug 5, 2024Updated last year
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 5 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- ☆137Apr 20, 2023Updated 2 years ago