c3rb3ru5d3d53c / mwcfg-modulesView external linksLinks
Malware Configuration Extraction Modules
☆51Nov 25, 2023Updated 2 years ago
Alternatives and similar repositories for mwcfg-modules
Users that are interested in mwcfg-modules are comparing it to the libraries listed below
Sorting:
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Nov 25, 2023Updated 2 years ago
- Configuration Extractors for Malware☆123Apr 23, 2025Updated 9 months ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- ☆16Apr 30, 2024Updated last year
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Feb 5, 2026Updated last week
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆42Sep 18, 2018Updated 7 years ago
- ☆27Nov 26, 2024Updated last year
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- Simple yara rule manager☆66Dec 27, 2022Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last week
- Distributed malware processing framework based on Python, Redis and S3.☆462Dec 1, 2025Updated 2 months ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Track torrent downloads☆14Dec 9, 2022Updated 3 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- ☆35Jan 13, 2026Updated last month
- Dynamic unpacker based on PE-sieve☆796Sep 13, 2025Updated 5 months ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- Leetcode solutions☆15Dec 24, 2025Updated last month
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆12May 31, 2023Updated 2 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- My talks and papers☆40Nov 24, 2025Updated 2 months ago
- Java安全研究与安全开发面试题库,同是也是常见知识点的梳理和总结,包含问题和详细的答案,计划定期更新☆16Apr 30, 2022Updated 3 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆114Feb 8, 2026Updated last week
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Oct 1, 2022Updated 3 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 2 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- IOC from articles, tweets for archives☆317Dec 12, 2023Updated 2 years ago
- Malduck is your ducky companion in malware analysis journeys☆349Jun 22, 2025Updated 7 months ago
- A Binary Genetic Traits Lexer Framework☆522Aug 14, 2025Updated 6 months ago