denisugarte / PowerDriveLinks
A tool for de-obfuscating PowerShell scripts
☆69Updated 6 years ago
Alternatives and similar repositories for PowerDrive
Users that are interested in PowerDrive are comparing it to the libraries listed below
Sorting:
- Static based decoders for malware samples☆93Updated 5 years ago
- ☆98Updated 4 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆139Updated 2 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- A tool for detecting VBA stomping.☆100Updated 2 years ago
- Automatic YARA rule generation for Malpedia☆161Updated 2 years ago
- ☆134Updated 6 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Documentation and supporting script sample for Windows Exploit Guard☆157Updated 3 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- c2 traffic☆189Updated 2 years ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆215Updated 5 years ago
- Windows Shortcut file (LNK) parser☆135Updated 2 years ago
- Generating YARA rules based on binary code☆213Updated 3 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆75Updated last month
- ☆83Updated 5 years ago
- An advanced memory forensics framework☆96Updated 5 years ago
- YARA rules for use with ProcFilter☆87Updated 8 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆77Updated 3 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Updated 10 years ago
- snake - a malware storage zoo☆216Updated 2 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Updated 4 months ago
- Allows you to quickly query a Windows machine for RAM artifacts☆220Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- A Maltego transform for VirusTotal vHash☆32Updated 5 years ago