VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls
☆153Mar 17, 2016Updated 10 years ago
Alternatives and similar repositories for vba-dynamic-hook
Users that are interested in vba-dynamic-hook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,117Jul 10, 2024Updated last year
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆293Jun 27, 2017Updated 8 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Python scripts to remove, change, and crack Office 97-2003/Office 2007/Office 2010/Office 2013 Macro Passwords☆136Oct 1, 2020Updated 5 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- Windows Shortcut file (LNK) parser☆137Nov 17, 2022Updated 3 years ago
- Malware Repository Framework☆98Mar 5, 2018Updated 8 years ago
- A VBA p-code disassembler☆485Jun 12, 2021Updated 4 years ago
- A tool for detecting VBA stomping.☆102Aug 4, 2022Updated 3 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- A tool for studying JavaScript malware.☆666Nov 22, 2024Updated last year
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,240Aug 7, 2025Updated 7 months ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆296Sep 30, 2023Updated 2 years ago
- Malware Configuration And Payload Extraction☆762Nov 22, 2024Updated last year
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆119Jun 19, 2019Updated 6 years ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- Community modules for FAME☆65Dec 16, 2025Updated 3 months ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- ExeFilter is an open-source tool and framework to filter file formats in e-mails, web pages or files. It detects many common file formats…☆71Dec 13, 2021Updated 4 years ago
- a vba pcode decompiler based on pcodedmp☆114Sep 15, 2021Updated 4 years ago
- Collaborative malware analysis framework☆382Jan 22, 2019Updated 7 years ago
- Credential Phish Analysis and Automation☆99Aug 22, 2018Updated 7 years ago
- CSV Parser and Writer as VBA functions☆31Sep 20, 2020Updated 5 years ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,300Feb 14, 2026Updated last month
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- A tool to detect and crash Cuckoo Sandbox☆297Jul 22, 2024Updated last year
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368May 21, 2024Updated last year
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- zer0m0n driver for cuckoo sandbox☆87Jul 12, 2016Updated 9 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆477Jun 16, 2023Updated 2 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago