d00rt / emotet_research
☆134Updated 6 years ago
Alternatives and similar repositories for emotet_research:
Users that are interested in emotet_research are comparing it to the libraries listed below
- Static based decoders for malware samples☆92Updated 4 years ago
- Various scripts for different malware families☆104Updated 3 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- Lazy Office Analyzer☆119Updated 8 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- ☆82Updated 8 years ago
- Smart DLL execution for malware analysis in sandbox systems☆143Updated 10 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Malware Repository Framework☆100Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆74Updated 3 years ago
- Python script to decode common encoded PowerShell scripts☆216Updated 6 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆219Updated 4 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- Automated malware unpacker☆119Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆105Updated 4 years ago
- A tool for de-obfuscating PowerShell scripts☆67Updated 5 years ago
- ☆82Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆74Updated 10 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆85Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Various Yara signatures (possibly to be included in a release later).☆86Updated 5 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- PE Import Hash Generator☆75Updated 7 years ago