A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck
☆131Nov 25, 2023Updated 2 years ago
Alternatives and similar repositories for mwcfg
Users that are interested in mwcfg are comparing it to the libraries listed below
Sorting:
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- A Binary Genetic Traits Lexer Framework☆524Feb 27, 2026Updated last week
- An IDA Pro extension for easier (malware) reverse engineering☆116Aug 2, 2022Updated 3 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 2 years ago
- Malduck is your ducky companion in malware analysis journeys☆349Jun 22, 2025Updated 8 months ago
- Malware dynamic instrumentation tool based on frida framework☆111Jun 7, 2020Updated 5 years ago
- Analyses in IDA/Hex-Rays☆87Apr 6, 2023Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Dynamic unpacker based on PE-sieve☆799Sep 13, 2025Updated 5 months ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Yet another rule generator for Yara☆29Jun 6, 2025Updated 9 months ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Mar 2, 2026Updated last week
- ☆15Nov 25, 2021Updated 4 years ago
- Miscellaneous Malware RE☆193May 1, 2022Updated 3 years ago
- Windows kernel and user mode emulation.☆1,868Updated this week
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- ☆16Apr 30, 2024Updated last year
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆262Mar 27, 2023Updated 2 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- ☆32Apr 24, 2022Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- ☆13Oct 29, 2022Updated 3 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- JPCERT/CC public YARA rules repository☆109Nov 14, 2025Updated 3 months ago
- ☆35Oct 29, 2021Updated 4 years ago
- A C# based tool for analysing malicious OneNote documents☆117Apr 4, 2023Updated 2 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,269Mar 1, 2026Updated last week
- Repository of YARA rules made by Trellix ATR Team☆625Mar 18, 2025Updated 11 months ago
- Generating YARA rules based on binary code☆220Oct 7, 2021Updated 4 years ago
- An automatic unpacker and logger for DotNet Framework targeting files☆264Aug 23, 2023Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- Go Lang Portable Executable Parser☆39Mar 31, 2021Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago