dod-cyber-crime-center / DC3-MWCPView external linksLinks
DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, filenames, and mutex names.
☆339Feb 7, 2025Updated last year
Alternatives and similar repositories for DC3-MWCP
Users that are interested in DC3-MWCP are comparing it to the libraries listed below
Sorting:
- ☆16Dec 5, 2023Updated 2 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- Python Decoders for Common Remote Access Trojans☆1,116Jul 16, 2024Updated last year
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆114Feb 8, 2026Updated last week
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆619Aug 8, 2022Updated 3 years ago
- yarGen is a generator for YARA rules☆1,773Jan 10, 2026Updated last month
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated 2 weeks ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Laika BOSS: Object Scanning System☆751Dec 16, 2024Updated last year
- Kaspersky's GReAT KLara☆730Jul 24, 2024Updated last year
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential …☆39Jul 30, 2013Updated 12 years ago
- File Scanning Framework☆295Sep 15, 2021Updated 4 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,877Feb 3, 2026Updated 2 weeks ago
- YARA signature and IOC database for my scanners and tools☆2,864Feb 5, 2026Updated last week
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- Malduck is your ducky companion in malware analysis journeys☆349Jun 22, 2025Updated 7 months ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- An open source framework for enterprise level automated analysis.☆393Jun 27, 2022Updated 3 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆462Dec 1, 2025Updated 2 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- Maco - Malware config extractor framework☆43Feb 4, 2026Updated last week
- A static analyzer for PE executables.☆1,104Jan 30, 2026Updated 2 weeks ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆262Mar 27, 2023Updated 2 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆518May 14, 2024Updated last year
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆208Mar 12, 2025Updated 11 months ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Dec 5, 2023Updated 2 years ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,118Jul 10, 2024Updated last year
- A guide on how to write fast and memory friendly YARA rules☆164Feb 11, 2025Updated last year
- Your Everyday Threat Intelligence☆1,949Updated this week