airbus-cert / vbSparkleLinks
VBScript & VBA source-to-source deobfuscator with partial-evaluation
☆77Updated 9 months ago
Alternatives and similar repositories for vbSparkle
Users that are interested in vbSparkle are comparing it to the libraries listed below
Sorting:
- Small visualizator for PE files☆69Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆115Updated 10 months ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated 2 years ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆174Updated 2 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Updated 3 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆109Updated 4 years ago
- Use YARA rules on Time Travel Debugging traces☆90Updated last year
- ☆52Updated 7 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆77Updated this week
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated last year
- ☆141Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆102Updated 2 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Repo containing my public talks☆23Updated 2 years ago
- ☆158Updated last month
- ☆20Updated last year
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- ETW based POC to identify direct and indirect syscalls☆185Updated 2 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆106Updated 3 months ago
- ☆115Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆51Updated last year
- IDA Pro plugin to aid with the analysis of native IIS modules☆18Updated 10 months ago
- Powershell script deobfuscation using AST in Python☆66Updated last year
- Powershell Linter☆53Updated last month
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆167Updated 2 months ago
- Lazarus analysis tools and research report☆56Updated last year
- Experiment on reproducing Obfuscate & Sleep☆145Updated 4 years ago