denisugarte / PowerDriveLinks
A tool for de-obfuscating PowerShell scripts
☆68Updated 6 years ago
Alternatives and similar repositories for PowerDrive
Users that are interested in PowerDrive are comparing it to the libraries listed below
Sorting:
- Static based decoders for malware samples☆93Updated 4 years ago
- ☆98Updated 4 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- An advanced memory forensics framework☆94Updated 5 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆138Updated 2 years ago
- Automatic YARA rule generation for Malpedia☆161Updated 2 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- ☆134Updated 6 years ago
- A tool for detecting VBA stomping.☆100Updated 2 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆76Updated 3 years ago
- Generating YARA rules based on binary code☆213Updated 3 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Updated 10 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- a modified version base on Tracecorn☆20Updated 5 years ago
- c2 traffic☆189Updated 2 years ago
- YARA rules for use with ProcFilter☆86Updated 7 years ago
- Various Yara signatures (possibly to be included in a release later).☆86Updated 6 years ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆215Updated 5 years ago
- ☆83Updated 5 years ago
- Windows Shortcut file (LNK) parser☆136Updated 2 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- POSHSPY backdoor code☆43Updated 8 years ago
- A taxonomy and dictionary of malware behaviors.☆43Updated 5 years ago
- snake - a malware storage zoo☆216Updated 2 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆74Updated last week
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago