airbus-cert / vbSparkle
VBScript & VBA source-to-source deobfuscator with partial-evaluation
☆76Updated 8 months ago
Alternatives and similar repositories for vbSparkle:
Users that are interested in vbSparkle are comparing it to the libraries listed below
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 9 months ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated 2 years ago
- Small visualizator for PE files☆69Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Updated 3 years ago
- Use YARA rules on Time Travel Debugging traces☆89Updated last year
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago
- Powershell Linter☆50Updated 3 weeks ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆50Updated this week
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆171Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- Winbindex bot to pull in binaries for specific releases☆47Updated last year
- ☆139Updated 2 years ago
- ☆52Updated 6 months ago
- ☆22Updated 10 months ago
- Reverse Engineering and Debugging Malware☆30Updated 2 years ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆42Updated 10 months ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆187Updated 3 years ago
- ☆156Updated 11 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆40Updated 7 months ago
- ☆114Updated 2 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- ☆75Updated 2 years ago
- Repo containing my public talks☆23Updated last year
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated 2 years ago
- Lazarus analysis tools and research report☆56Updated last year
- ETW based POC to identify direct and indirect syscalls☆185Updated 2 years ago