bontchev / pcodedmp
A VBA p-code disassembler
☆461Updated 3 years ago
Alternatives and similar repositories for pcodedmp:
Users that are interested in pcodedmp are comparing it to the libraries listed below
- A VBA parser and emulation engine to analyze malicious macros.☆1,072Updated 7 months ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆276Updated 3 years ago
- a vba pcode decompiler based on pcodedmp☆108Updated 3 years ago
- VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls☆146Updated 8 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆575Updated 9 months ago
- A tool for detecting VBA stomping.☆98Updated 2 years ago
- VBA Obfuscation Tools combined with an MS office document generator☆540Updated 7 years ago
- ☆422Updated last year
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆281Updated 7 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆795Updated 5 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆219Updated 4 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆95Updated this week
- Commandline low level file extractor for NTFS☆280Updated 5 years ago
- Windows registry file format specification☆337Updated 6 years ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆261Updated 3 years ago
- ETW Python Library☆276Updated last year
- PowerShell script for deobfuscating encoded PowerShell scripts☆424Updated 4 years ago
- Live hunting of code injection techniques☆380Updated 5 years ago
- ☆275Updated last year
- ☆297Updated 4 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆304Updated 5 years ago
- ☆752Updated last year
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆192Updated 4 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆449Updated 2 years ago
- ☆213Updated 6 years ago
- Quickly debug shellcode extracted during malware analysis☆582Updated last year
- FileInsight-plugins: decoding toolbox of McAfee FileInsight hex editor for malware analysis☆159Updated 2 months ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆378Updated 4 years ago
- Tool suite for inspecting NTFS artifacts.☆218Updated last year
- Extract embedded files and macros from office documents.☆178Updated last year