cylance / GetNETGUIDs
Extract GUIDs from .NET assemblies
☆21Updated 8 years ago
Alternatives and similar repositories for GetNETGUIDs:
Users that are interested in GetNETGUIDs are comparing it to the libraries listed below
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- Volatility Plugins☆21Updated 9 years ago
- ☆19Updated 6 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- ☆16Updated 10 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Frontend for Codex Gigas☆21Updated 8 years ago
- openioc_scan Volatility Framework plugin☆42Updated 9 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 9 years ago
- Automation for VirusTotal☆31Updated 8 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- QEMU with rVMI extensions☆25Updated 7 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- Useful scripts, rules etc. for use with YARA☆27Updated 4 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- onigiri - remote malware triage script☆24Updated 9 years ago
- ☆36Updated 8 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- RegRipper wrapper for simplified bulk parsing or registry hives☆9Updated 6 years ago
- A Windows Event Processing Utility☆46Updated 7 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Updated 8 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- Manage VT Alerts☆62Updated 8 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Tools☆13Updated last year
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Updated 8 years ago