☆136Jan 24, 2019Updated 7 years ago
Alternatives and similar repositories for emotet_research
Users that are interested in emotet_research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆83Jan 31, 2020Updated 6 years ago
- emotet configs pulled from https://cape.contextis.com/☆15Apr 27, 2022Updated 3 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆24Jan 24, 2020Updated 6 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- parse strace log☆12Oct 16, 2019Updated 6 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- Miscellaneous Malware RE☆193May 1, 2022Updated 3 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- FakeOpenSmtpRelay.py is a Python3 script simulating a working open SMTP relay☆13Mar 18, 2019Updated 7 years ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆266Jan 15, 2022Updated 4 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆164Apr 10, 2023Updated 2 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 7 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- ☆12May 8, 2020Updated 5 years ago
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- Community-based integrated malware identification system☆81Dec 10, 2022Updated 3 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Static based decoders for malware samples☆94Jul 27, 2020Updated 5 years ago
- Slides of 44Con 2018☆23Oct 11, 2018Updated 7 years ago
- A VBA p-code disassembler☆484Jun 12, 2021Updated 4 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107May 22, 2020Updated 5 years ago
- ☆29May 10, 2020Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Scripts and rulesets for analysing the Winnti malware☆24Jul 24, 2019Updated 6 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92May 23, 2019Updated 6 years ago