Malware Configuration Extraction Modules
☆51Nov 25, 2023Updated 2 years ago
Alternatives and similar repositories for mwcfg-modules
Users that are interested in mwcfg-modules are comparing it to the libraries listed below
Sorting:
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Nov 25, 2023Updated 2 years ago
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 10 months ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- ☆16Apr 30, 2024Updated last year
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Updated this week
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Mar 2, 2026Updated last week
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- ☆27Nov 26, 2024Updated last year
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆462Updated this week
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Track torrent downloads☆14Dec 9, 2022Updated 3 years ago
- ☆35Jan 13, 2026Updated last month
- Dynamic unpacker based on PE-sieve☆799Sep 13, 2025Updated 5 months ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- Leetcode solutions☆15Dec 24, 2025Updated 2 months ago
- ☆13Oct 29, 2022Updated 3 years ago
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆13May 31, 2023Updated 2 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- My talks and papers☆40Nov 24, 2025Updated 3 months ago
- Java安全研究与安全开发面试题库,同是也是常见知识点的梳理和总结,包含问题和详细的答案,计划定期更新☆16Apr 30, 2022Updated 3 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Graphoscope is a solution to access multiple independent data sources from a common UI and show data relations as a graph☆41Sep 25, 2025Updated 5 months ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆116Updated this week
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 4 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago