Static file analysis for PE files
☆13Dec 4, 2020Updated 5 years ago
Alternatives and similar repositories for pe-static
Users that are interested in pe-static are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆53Jan 28, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- A Python interface for automating Ghidra tasks.☆11Jun 17, 2024Updated last year
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 11 months ago
- Automatically set traffic rules for Dynamic IP Addresses from a Dynamic DNS Domain☆12May 31, 2022Updated 3 years ago
- A tiny set of helper scripts for ipinfo☆17Aug 7, 2020Updated 5 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 5 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆13Feb 24, 2020Updated 6 years ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Feb 7, 2019Updated 7 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 5 months ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Oct 28, 2018Updated 7 years ago
- Python API bindings for FireEye Products☆14Feb 17, 2021Updated 5 years ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Mar 29, 2021Updated 5 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- bypass360☆17May 31, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Terminal Forensics CheatSheets☆14Jul 28, 2015Updated 10 years ago
- 三轮转轮密码机加密及解密程序☆11Feb 19, 2018Updated 8 years ago
- CVEs for Integrated Dell Remote Access Controller (iDRAC)☆23Updated this week
- Log4j honeypot to capture payloads within HTTP headers, query parameters and POST requests.☆14Dec 15, 2021Updated 4 years ago
- Code & other materials from SEC-T 2022 talk "When SysAdmin & Hacker Unite: 21 One-Liners to make you convert from bash to Powershell"☆16Sep 17, 2022Updated 3 years ago
- 原生JS实现瀑布流布局。A waterfall demo by JavaScript.☆13Feb 18, 2017Updated 9 years ago
- Malware Machine Learning☆27Apr 1, 2018Updated 8 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Certificate Export Utility☆26May 1, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Playbooks designed for IBM SOAR developed by The IR Gurus. These playbooks can be used to demonstrate how to design playbooks, perform au…☆18May 1, 2024Updated 2 years ago
- Longue vue is an exploit chain that can compromise over the internet NETGEAR DGND3700v2 devices.☆26Mar 15, 2022Updated 4 years ago
- Various tools and scripts☆43Nov 30, 2022Updated 3 years ago
- ☆24Feb 21, 2025Updated last year
- An open source script to perform malware static analysis on Portable Executable☆332May 23, 2023Updated 2 years ago
- 网络安全 LLM 智能体应用教程☆29Mar 2, 2025Updated last year
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago