VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls
☆153Mar 17, 2016Updated 9 years ago
Alternatives and similar repositories for vba-dynamic-hook
Users that are interested in vba-dynamic-hook are comparing it to the libraries listed below
Sorting:
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Python scripts to remove, change, and crack Office 97-2003/Office 2007/Office 2010/Office 2013 Macro Passwords☆136Oct 1, 2020Updated 5 years ago
- A tool for detecting VBA stomping.☆101Aug 4, 2022Updated 3 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆293Jun 27, 2017Updated 8 years ago
- Windows Shortcut file (LNK) parser☆137Nov 17, 2022Updated 3 years ago
- Malware Repository Framework☆98Mar 5, 2018Updated 7 years ago
- A VBA p-code disassembler☆483Jun 12, 2021Updated 4 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Community modules for FAME☆65Dec 16, 2025Updated 2 months ago
- A tool for studying JavaScript malware.☆666Nov 22, 2024Updated last year
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆120Jun 19, 2019Updated 6 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,233Aug 7, 2025Updated 6 months ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆294Sep 30, 2023Updated 2 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- ExeFilter is an open-source tool and framework to filter file formats in e-mails, web pages or files. It detects many common file formats…☆70Dec 13, 2021Updated 4 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- Collaborative malware analysis framework☆381Jan 22, 2019Updated 7 years ago
- A tool to detect and crash Cuckoo Sandbox☆297Jul 22, 2024Updated last year
- ☆75Jan 24, 2017Updated 9 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆476Jun 16, 2023Updated 2 years ago
- ☆715Oct 28, 2022Updated 3 years ago
- Comae Hibernation File Decompressor☆156Apr 1, 2023Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- This python based milter (mail-filter) checks an incoming mail for suspicious VBA macro code in MS 20xx Office attachments (doc, xls, ppt…☆39Mar 29, 2021Updated 4 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- a vba pcode decompiler based on pcodedmp☆112Sep 15, 2021Updated 4 years ago
- zer0m0n driver for cuckoo sandbox☆87Jul 12, 2016Updated 9 years ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,295Feb 14, 2026Updated 2 weeks ago
- A static analyzer for PE executables.☆1,107Feb 24, 2026Updated last week
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago