intezer / analyze-community-ghidra-plugin
Ghidra plugin for https://analyze.intezer.com
☆70Updated 2 years ago
Alternatives and similar repositories for analyze-community-ghidra-plugin:
Users that are interested in analyze-community-ghidra-plugin are comparing it to the libraries listed below
- ☆71Updated last year
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- ☆18Updated 4 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 11 months ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆40Updated 5 years ago
- Yet another rule generator for Yara☆28Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆54Updated 2 months ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- Malware Configuration Extraction Modules☆49Updated last year
- ☆26Updated last year
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- A Maltego transform for VirusTotal vHash☆32Updated 5 years ago
- ☆22Updated 5 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 3 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- ☆15Updated 2 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated 7 months ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated 4 months ago
- Flare-On solutions☆36Updated 5 years ago
- ☆61Updated 9 months ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆64Updated 3 years ago