Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis
☆40Mar 8, 2015Updated 10 years ago
Alternatives and similar repositories for rapid_env
Users that are interested in rapid_env are comparing it to the libraries listed below
Sorting:
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- Python Web App to Parse and Track Email and http Pcap Files.☆54Jul 14, 2013Updated 12 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Crossplatform hex editor intended mainly for reverse-engineering and data analysis☆10Mar 10, 2018Updated 7 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- A PE Header-Based Antivirus Tool☆11Nov 14, 2014Updated 11 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- A set of codecs for python that are useful to have for CTF or general hacking.☆35Sep 2, 2018Updated 7 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- ☆15Jan 14, 2016Updated 10 years ago
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 11 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- Automated malware unpacker☆121Mar 5, 2016Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Python regex generator (list of strings => Regex)☆12Jun 21, 2022Updated 3 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 9 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- ☆15Feb 22, 2021Updated 5 years ago