☆83Jan 31, 2020Updated 6 years ago
Alternatives and similar repositories for emotet_network_protocol
Users that are interested in emotet_network_protocol are comparing it to the libraries listed below
Sorting:
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Dec 27, 2022Updated 3 years ago
- ☆136Jan 24, 2019Updated 7 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆23Jan 24, 2020Updated 6 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 4 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- TA505 unpacker Python 2.7☆46Jun 22, 2020Updated 5 years ago
- c2 traffic☆194Feb 6, 2023Updated 3 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Feb 5, 2021Updated 5 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆262Mar 27, 2023Updated 2 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 2 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆111Apr 20, 2021Updated 4 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Jan 5, 2022Updated 4 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Yet another rule generator for Yara☆29Jun 6, 2025Updated 8 months ago
- Miscellaneous Malware RE☆193May 1, 2022Updated 3 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- ☆29May 10, 2020Updated 5 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Generating YARA rules based on binary code☆220Oct 7, 2021Updated 4 years ago
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 4 months ago
- ☆28Jan 22, 2025Updated last year
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆80Jan 2, 2022Updated 4 years ago
- Malduck is your ducky companion in malware analysis journeys☆349Jun 22, 2025Updated 8 months ago
- Hatching Triage public command-line utility and API library.☆74Oct 9, 2023Updated 2 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- Static based decoders for malware samples☆94Jul 27, 2020Updated 5 years ago
- ☆537Updated this week
- An IDA Plugin that help analyzing module that use COM☆230Oct 10, 2025Updated 4 months ago