cube0x8 / ChromeRagamuffin
Google Chrome internals analysis using Volatility
☆39Updated last year
Related projects: ⓘ
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 5 years ago
- A Volatility plugin for finding sqlite database rows☆22Updated 5 years ago
- ☆36Updated 4 years ago
- ☆32Updated 3 months ago
- A collection of Volatility Framework plugins.☆26Updated 11 years ago
- Handy scripts to speed up malware analysis☆35Updated 11 months ago
- pure Python binary analysis framework☆21Updated 5 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆17Updated 3 years ago
- ☆35Updated this week
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Plugins for the Viper Framework☆14Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆52Updated 6 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 5 years ago
- Radare2 Metadata Extraction to Elasticsearch☆21Updated 3 months ago
- a collection of yara rules for binary analysis☆23Updated 7 years ago
- Basic file metadata gathering script☆21Updated 2 years ago
- ☆51Updated 6 years ago
- ☆42Updated 5 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆21Updated 6 years ago
- ☆47Updated 4 years ago
- TA505 unpacker Python 2.7☆45Updated 4 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 7 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 5 years ago
- Windows link file (shortcuts) examiner☆65Updated 3 months ago
- Transfer EIP control to shellcode during malware analysis investigation☆73Updated 9 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆25Updated 8 years ago
- Go Lang Portable Executable Parser☆37Updated 3 years ago