☆136Jan 24, 2019Updated 7 years ago
Alternatives and similar repositories for emotet_research
Users that are interested in emotet_research are comparing it to the libraries listed below
Sorting:
- emotet configs pulled from https://cape.contextis.com/☆14Apr 27, 2022Updated 3 years ago
- ☆83Jan 31, 2020Updated 6 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆23Jan 24, 2020Updated 6 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Miscellaneous Malware RE☆193May 1, 2022Updated 3 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- ☆12May 8, 2020Updated 5 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆164Apr 10, 2023Updated 2 years ago
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆265Jan 15, 2022Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- A tool for studying JavaScript malware.☆15Updated this week
- An advanced memory forensics framework☆96Sep 26, 2019Updated 6 years ago
- FakeOpenSmtpRelay.py is a Python3 script simulating a working open SMTP relay☆13Mar 18, 2019Updated 6 years ago
- ☆14Mar 9, 2023Updated 2 years ago
- R-CSIRT Linux Triage tool☆39Jun 28, 2018Updated 7 years ago
- ☆29May 10, 2020Updated 5 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- CAPE monitor DLLs☆42Dec 3, 2019Updated 6 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Oct 5, 2020Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆91May 23, 2019Updated 6 years ago
- sign elf binaries with GPG☆17Oct 10, 2016Updated 9 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- A VBA p-code disassembler☆484Jun 12, 2021Updated 4 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago