☆154Dec 6, 2018Updated 7 years ago
Alternatives and similar repositories for MaliciousMacroBot
Users that are interested in MaliciousMacroBot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Jupyter notebooks for threat hunting☆61May 16, 2026Updated last week
- ☆18Jun 8, 2018Updated 7 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆196Oct 24, 2016Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆93Oct 15, 2017Updated 8 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- ☆17Mar 31, 2026Updated last month
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆476Jun 16, 2023Updated 2 years ago
- Script analysis tool based on Frida.re☆130May 31, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Yara rule generator for finding related samples and hunting☆165Sep 11, 2022Updated 3 years ago
- Powershell sandboxing utility☆19Updated this week
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- FAME Automates Malware Evaluation☆937May 3, 2026Updated 2 weeks ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 4 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- An open source framework for enterprise level automated analysis.☆392Jun 27, 2022Updated 3 years ago
- Real-time, container-based file scanning at enterprise scale☆985May 16, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Laika BOSS: Object Scanning System☆749Dec 16, 2024Updated last year
- YARA malware query accelerator (web frontend)☆439Feb 3, 2026Updated 3 months ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107May 22, 2020Updated 6 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Jan 18, 2024Updated 2 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,120Jul 10, 2024Updated last year
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆50Apr 11, 2026Updated last month
- ☆20Sep 23, 2018Updated 7 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,867Nov 17, 2021Updated 4 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Mass static malware analysis tool☆95Apr 4, 2026Updated last month
- 16,432 Free Yara rules created by☆389Jun 1, 2019Updated 6 years ago
- ☆93Dec 14, 2018Updated 7 years ago