☆154Dec 6, 2018Updated 7 years ago
Alternatives and similar repositories for MaliciousMacroBot
Users that are interested in MaliciousMacroBot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Jupyter notebooks for threat hunting☆60Mar 26, 2025Updated 11 months ago
- ☆18Jun 8, 2018Updated 7 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆196Oct 24, 2016Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆93Oct 15, 2017Updated 8 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- ☆17Jan 21, 2026Updated 2 months ago
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆477Jun 16, 2023Updated 2 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Script analysis tool based on Frida.re☆131May 31, 2017Updated 8 years ago
- Powershell sandboxing utility☆20Mar 2, 2026Updated 2 weeks ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Real-time, container-based file scanning at enterprise scale☆978Mar 6, 2026Updated 2 weeks ago
- Laika BOSS: Object Scanning System☆751Dec 16, 2024Updated last year
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107May 22, 2020Updated 5 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Jan 18, 2024Updated 2 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆50Nov 3, 2025Updated 4 months ago
- ☆20Sep 23, 2018Updated 7 years ago
- Mass static malware analysis tool☆94Feb 13, 2022Updated 4 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,859Nov 17, 2021Updated 4 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- CVE-2017-11882 File Generator PoC☆35Nov 22, 2017Updated 8 years ago