☆83Jan 31, 2020Updated 6 years ago
Alternatives and similar repositories for emotet_network_protocol
Users that are interested in emotet_network_protocol are comparing it to the libraries listed below
Sorting:
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Dec 27, 2022Updated 3 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆24Jan 24, 2020Updated 6 years ago
- ☆136Jan 24, 2019Updated 7 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Feb 5, 2021Updated 5 years ago
- Malware Configuration And Payload Extraction☆762Nov 22, 2024Updated last year
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- c2 traffic☆194Feb 6, 2023Updated 3 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 4 years ago
- ☆28Jan 22, 2025Updated last year
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆80Jan 2, 2022Updated 4 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 3 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- ☆15Jun 5, 2019Updated 6 years ago
- Miscellaneous Malware RE☆193May 1, 2022Updated 3 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆263Mar 27, 2023Updated 2 years ago
- TA505 unpacker Python 2.7☆46Jun 22, 2020Updated 5 years ago
- Hatching Triage public command-line utility and API library.☆75Oct 9, 2023Updated 2 years ago
- Generating YARA rules based on binary code☆221Oct 7, 2021Updated 4 years ago
- Static based decoders for malware samples☆94Jul 27, 2020Updated 5 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- emotet configs pulled from https://cape.contextis.com/☆15Apr 27, 2022Updated 3 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Jun 29, 2019Updated 6 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- Malduck is your ducky companion in malware analysis journeys☆350Jun 22, 2025Updated 9 months ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆113Apr 20, 2021Updated 4 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- ☆29May 10, 2020Updated 5 years ago
- An IDA Plugin that help analyzing module that use COM☆231Oct 10, 2025Updated 5 months ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- Best practices in threat intelligence☆50Nov 6, 2022Updated 3 years ago