eset / vba-dynamic-hookLinks
VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls
☆151Updated 9 years ago
Alternatives and similar repositories for vba-dynamic-hook
Users that are interested in vba-dynamic-hook are comparing it to the libraries listed below
Sorting:
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆109Updated 4 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆279Updated 4 years ago
- Smart DLL execution for malware analysis in sandbox systems☆143Updated 10 years ago
- Windows Shortcut file (LNK) parser☆137Updated 3 years ago
- Lazy Office Analyzer☆121Updated 8 years ago
- ☆136Updated 6 years ago
- Extract embedded files and macros from office documents.☆186Updated 2 years ago
- A tool for detecting VBA stomping.☆101Updated 3 years ago
- Python script to decode common encoded PowerShell scripts☆217Updated 7 years ago
- Reconstruct process trees from event logs☆147Updated 5 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Updated 8 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆114Updated 8 years ago
- Ruxcon2016 POC Code☆141Updated 9 years ago
- Various config files obtained during malware analysis☆67Updated 7 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆218Updated 5 years ago
- Tool to view and create Microsoft shim database files (SDB).☆118Updated 8 years ago
- ☆82Updated 6 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆142Updated 3 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 6 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆292Updated 8 years ago
- zer0m0n driver for cuckoo sandbox☆87Updated 9 years ago
- Automatically exported from code.google.com/p/malware-lu☆56Updated 6 years ago
- ☆82Updated 9 years ago
- ☆108Updated 8 years ago
- Small random scripts for various things I find myself needing to repeat/automate☆24Updated 4 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 7 years ago
- ☆220Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Updated 11 years ago
- Comae Hibernation File Decompressor☆155Updated 2 years ago