jeFF0Falltrades / rat_king_parser
A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno RAT, and cloned/derivative RAT families.
☆43Updated 3 weeks ago
Alternatives and similar repositories for rat_king_parser:
Users that are interested in rat_king_parser are comparing it to the libraries listed below
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 2 months ago
- Configuration Extractors for Malware☆102Updated this week
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆41Updated last week
- IDA Python scripts☆35Updated 2 weeks ago
- ☆73Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 9 months ago
- ☆113Updated 2 months ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆70Updated last year
- ☆29Updated last month
- ☆20Updated last year
- Extracting AsyncRAT configuration using CyberChef☆12Updated 2 years ago
- ☆35Updated 2 months ago
- General malware analysis stuff☆36Updated 8 months ago
- Native Python3 bindings for @horsicq's Detect-It-Easy☆66Updated last month
- IDA Pro plugin to aid with the analysis of native IIS modules☆18Updated 8 months ago
- Golang bindings for PE-sieve☆43Updated last year
- Repository of Yara Rules☆110Updated 2 weeks ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated 2 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- ☆66Updated 2 months ago
- Use YARA rules on Time Travel Debugging traces☆89Updated last year
- ☆27Updated 5 months ago
- Rule Engine for Dynamic Malware Analysis and Research☆23Updated last week
- Powershell Linter☆50Updated 3 weeks ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆44Updated 10 months ago
- Malware Analysis tools☆26Updated 7 months ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Updated 2 years ago
- ☆36Updated 4 months ago