decalage2 / oletools
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
☆3,039Updated 3 months ago
Alternatives and similar repositories for oletools:
Users that are interested in oletools are comparing it to the libraries listed below
- Please no pull requests for this repository. Thanks!☆2,189Updated last week
- YARA signature and IOC database for my scanners and tools☆2,596Updated this week
- Loki - Simple IOC and YARA Scanner☆3,516Updated 4 months ago
- Mimikatz implementation in pure Python☆2,988Updated last month
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,875Updated 10 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,085Updated 9 months ago
- Volatility 3.0 development☆3,021Updated this week
- yarGen is a generator for YARA rules☆1,626Updated 2 weeks ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,894Updated last week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,503Updated this week
- A curated list of awesome YARA rules, tools, and people.☆3,772Updated 3 weeks ago
- Malware Configuration And Payload Extraction☆2,347Updated this week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,511Updated 2 weeks ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,160Updated this week
- A toolset to make a system look as if it was the victim of an APT attack☆2,568Updated last year
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,040Updated 3 months ago
- PowerShell Obfuscator☆3,929Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,252Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,163Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,054Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,463Updated this week
- Trying to tame the three-headed dog.☆4,401Updated 2 weeks ago
- Repository of yara rules☆4,362Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,447Updated 2 months ago
- Windows Exploit Suggester - Next Generation☆4,393Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,167Updated 2 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,108Updated 3 weeks ago
- Indicators of Compromises (IOC) of our various investigations☆1,754Updated 3 weeks ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,238Updated 8 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,757Updated last month