d00rt / emotet_researchLinks
☆134Updated 6 years ago
Alternatives and similar repositories for emotet_research
Users that are interested in emotet_research are comparing it to the libraries listed below
Sorting:
- Various scripts for different malware families☆106Updated 4 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- ☆83Updated 5 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Updated 10 years ago
- Automated malware unpacker☆120Updated 9 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- snake - a malware storage zoo☆216Updated 2 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- Static based decoders for malware samples☆93Updated 4 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆220Updated 4 years ago
- Miscellaneous Malware RE☆196Updated 3 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 10 months ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆138Updated 2 years ago
- ☆98Updated 4 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆76Updated 3 years ago
- A Yara rule generator for finding related samples and hunting☆160Updated 2 years ago
- ☆43Updated 6 years ago
- A tool for de-obfuscating PowerShell scripts☆68Updated 6 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- A taxonomy and dictionary of malware behaviors.☆43Updated 5 years ago
- Malware Repository Framework☆99Updated 7 years ago
- ☆82Updated 9 years ago
- Process HTTP Pcaps With YARA☆103Updated 11 years ago
- Various Yara signatures (possibly to be included in a release later).☆86Updated 6 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Updated 6 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆86Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago