decalage2 / oletoolsLinks
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
☆3,261Updated 7 months ago
Alternatives and similar repositories for oletools
Users that are interested in oletools are comparing it to the libraries listed below
Sorting:
- Please no pull requests for this repository. Thanks!☆2,386Updated last month
- A VBA parser and emulation engine to analyze malicious macros.☆1,115Updated last year
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,052Updated last month
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,832Updated last week
- YARA signature and IOC database for my scanners and tools☆2,845Updated 2 weeks ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,039Updated 3 months ago
- A curated list of awesome YARA rules, tools, and people.☆4,124Updated 9 months ago
- Loki - Simple IOC and YARA Scanner☆3,705Updated last week
- Repository of yara rules☆4,670Updated last year
- Volatility 3.0 development☆3,829Updated last week
- yarGen is a generator for YARA rules☆1,770Updated last week
- Mimikatz implementation in pure Python☆3,228Updated 2 weeks ago
- Malware Configuration And Payload Extraction☆2,934Updated this week
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,219Updated 5 months ago
- A list of cyber-chef recipes and curated links☆2,176Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,703Updated 3 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,424Updated 3 months ago
- Indicators of Compromises (IOC) of our various investigations☆1,907Updated last month
- Digging Deeper....☆3,689Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,234Updated 3 weeks ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,291Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,496Updated 2 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,417Updated 3 months ago
- Interesting APT Report Collection And Some Special IOCs☆2,853Updated last week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,257Updated last month
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,782Updated 5 months ago
- Windows Events Attack Samples☆2,491Updated 2 years ago
- APT & CyberCriminal Campaign Collection☆4,036Updated last year
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,052Updated 7 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,578Updated last year