Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.
☆22Jul 11, 2022Updated 3 years ago
Alternatives and similar repositories for mbcscan
Users that are interested in mbcscan are comparing it to the libraries listed below
Sorting:
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- A simple AES malware crypter☆16Mar 16, 2018Updated 7 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Sources Codes of many MSIL malwares☆24Aug 29, 2022Updated 3 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 8 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- ☆27Mar 2, 2022Updated 4 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Convert PE files to a shellcode☆81May 7, 2020Updated 5 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆142Oct 12, 2020Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Fast incident overview☆41Feb 11, 2017Updated 9 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- 📨 AI Mailbox, powered by Dialogflow☆10Apr 18, 2020Updated 5 years ago
- A dynamic confuserex unpacker that relies on invoke for most things☆43Mar 15, 2020Updated 5 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Apr 8, 2020Updated 5 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Aug 4, 2021Updated 4 years ago
- ☆44Dec 31, 2016Updated 9 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- A ready-made template for a project based on libpeconv.☆52Oct 31, 2025Updated 4 months ago
- ☆46Jun 14, 2018Updated 7 years ago
- A Python malware analysis library.☆50May 1, 2023Updated 2 years ago
- ☆11Mar 9, 2018Updated 7 years ago