accidentalrebel / mbcscanView external linksLinks
Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.
☆22Jul 11, 2022Updated 3 years ago
Alternatives and similar repositories for mbcscan
Users that are interested in mbcscan are comparing it to the libraries listed below
Sorting:
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- A simple AES malware crypter☆16Mar 16, 2018Updated 7 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Various capabilities for static malware analysis.☆79Sep 4, 2024Updated last year
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 7 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- ☆27Mar 2, 2022Updated 3 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- Simple API Hooks detector☆77Aug 22, 2022Updated 3 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Convert PE files to a shellcode☆80May 7, 2020Updated 5 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 5 months ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆145Oct 12, 2020Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Fast incident overview☆41Feb 11, 2017Updated 9 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆242Nov 27, 2025Updated 2 months ago
- Cryptographic Dataset Generation & Modelling Framework☆41Apr 8, 2020Updated 5 years ago
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fi…☆10Mar 7, 2023Updated 2 years ago
- A dynamic confuserex unpacker that relies on invoke for most things☆43Mar 15, 2020Updated 5 years ago
- Pentesting toolbox for CachyOS/Cachy Handheld edition☆32Jan 29, 2026Updated 2 weeks ago
- UWPStation is an app that looks like VMware Workstation.☆10Jul 1, 2024Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Aug 4, 2021Updated 4 years ago
- ☆44Dec 31, 2016Updated 9 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- A ready-made template for a project based on libpeconv.☆51Oct 31, 2025Updated 3 months ago