TheEnergyStory / malware_analysis_toolsLinks
Tools helpful for malware analysis
☆23Updated last year
Alternatives and similar repositories for malware_analysis_tools
Users that are interested in malware_analysis_tools are comparing it to the libraries listed below
Sorting:
- ☆27Updated 9 months ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆64Updated 3 years ago
- ☆18Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆73Updated 6 months ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- AdHoc solutions☆48Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆47Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- pypykatz plugin for volatility3 framework☆42Updated 3 months ago
- Malware Analysis tools☆26Updated last year
- ☆45Updated last year
- A pcap capture analysis helper☆25Updated 2 years ago
- Lazarus analysis tools and research report☆56Updated last year
- ☆43Updated 3 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Updated last year
- Dumping credentials through windbg and pykd☆41Updated last year
- ☆37Updated 3 years ago
- Golang bindings for PE-sieve☆42Updated last year
- ☆48Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 2 weeks ago
- ☆12Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- A Multi-Threaded PE Export Collection Utility☆15Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 4 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Yara Rules for Modern Malware☆79Updated last year