☆28Jan 22, 2025Updated last year
Alternatives and similar repositories for emotet-utils
Users that are interested in emotet-utils are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- ☆11Dec 26, 2022Updated 3 years ago
- ☆83Jan 31, 2020Updated 6 years ago
- emotet configs pulled from https://cape.contextis.com/☆15Apr 27, 2022Updated 3 years ago
- My collection of scripts for Ghidra (https://github.com/NationalSecurityAgency/ghidra)☆10Sep 13, 2020Updated 5 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆15Aug 17, 2018Updated 7 years ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- ☆19Sep 21, 2020Updated 5 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- ☆18May 3, 2021Updated 4 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Keystone security monitor library for opensbi (Discountinued after monorepo-izing)☆13Oct 28, 2022Updated 3 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- this is Crytolocket Malware Domain Generation Algorithm (DGA). Cryptolocker uses DGA to generate 1000 to 10000 unique domain names for it…☆14Sep 5, 2016Updated 9 years ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Oct 8, 2020Updated 5 years ago
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆21Sep 26, 2019Updated 6 years ago
- This is a simple driver with x64 inline assembly☆55Jun 26, 2020Updated 5 years ago
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- Send Emails from another account☆28Mar 8, 2024Updated 2 years ago
- Cert Michelin Awareness Card Game repository☆15Dec 10, 2017Updated 8 years ago
- A collection of anti disassembly techniques☆20Jul 22, 2017Updated 8 years ago
- Virtual Machine Introspection (VMI) for memory forensics and machine-learning.☆28Jun 2, 2025Updated 9 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- Official Elastic Skills☆80Updated this week
- ☆73Sep 4, 2023Updated 2 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- RCS Agent for Windows Mobile☆22Jul 6, 2015Updated 10 years ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- ☆26Mar 26, 2014Updated 11 years ago
- TA505 unpacker Python 2.7☆46Jun 22, 2020Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆42Jan 31, 2025Updated last year
- ☆37Feb 3, 2017Updated 9 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Some WIP GameCube toolchain in Rust☆13Jun 15, 2021Updated 4 years ago