Machine Learning for malicious Javascript code detection
☆19Jan 13, 2017Updated 9 years ago
Alternatives and similar repositories for JsItBad
Users that are interested in JsItBad are comparing it to the libraries listed below
Sorting:
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 7 years ago
- Cert Michelin Awareness Card Game repository☆15Dec 10, 2017Updated 8 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆92Mar 1, 2023Updated 3 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- a TNEF decoding library written in python, without external dependencies☆51Oct 28, 2025Updated 4 months ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆23Jun 29, 2025Updated 8 months ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- Handling Microsoft Visio 2013 vsdx files from Python☆19Sep 2, 2016Updated 9 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- VBA analysis tools☆25Aug 15, 2025Updated 6 months ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Nov 15, 2025Updated 3 months ago
- Golang parser for OLE files☆33Dec 4, 2025Updated 2 months ago
- Python wrapper for the Mitre ATT&CK framework API☆31Mar 12, 2018Updated 7 years ago
- ☆32Jan 24, 2016Updated 10 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- analysis of visual basic code☆47Mar 25, 2018Updated 7 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆96Jan 13, 2026Updated last month
- Full-bin indexation of binary files☆91May 19, 2018Updated 7 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- ☆10May 12, 2022Updated 3 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 7 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- A salesforce library designed to provide idiomatic clojure representations of salesforce data and metadata☆11Jan 14, 2020Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago