jeromesegura / EKFiddleView external linksLinks
Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.
☆644Nov 27, 2024Updated last year
Alternatives and similar repositories for EKFiddle
Users that are interested in EKFiddle are comparing it to the libraries listed below
Sorting:
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Oct 26, 2022Updated 3 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,049Oct 19, 2025Updated 3 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- Utilities for Sysmon☆1,569Sep 21, 2025Updated 4 months ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- A VBA parser and emulation engine to analyze malicious macros.☆1,118Jul 10, 2024Updated last year
- YARA signature and IOC database for my scanners and tools☆2,864Feb 5, 2026Updated last week
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Aug 23, 2021Updated 4 years ago
- 16,432 Free Yara rules created by☆390Jun 1, 2019Updated 6 years ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆469Jul 21, 2020Updated 5 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,229Aug 7, 2025Updated 6 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,710Sep 23, 2025Updated 4 months ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆479Jun 16, 2023Updated 2 years ago
- IOC from articles, tweets for archives☆317Dec 12, 2023Updated 2 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,553Oct 31, 2025Updated 3 months ago
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆431May 22, 2020Updated 5 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last week
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆747Dec 11, 2023Updated 2 years ago
- A static analyzer for PE executables.☆1,104Jan 30, 2026Updated 2 weeks ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆264Jan 15, 2022Updated 4 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆840Jun 25, 2024Updated last year
- FAME Automates Malware Evaluation☆926Dec 16, 2025Updated last month
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,679Feb 14, 2024Updated 2 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆554May 9, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆504Oct 21, 2022Updated 3 years ago
- Windows Events Attack Samples☆2,507Jan 24, 2023Updated 3 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Powershell C2 Server and Implants☆574Nov 11, 2019Updated 6 years ago
- Loki - Simple IOC and YARA Scanner☆3,719Jan 12, 2026Updated last month
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year
- A tool for studying JavaScript malware.☆667Nov 22, 2024Updated last year
- Your Everyday Threat Intelligence☆1,949Updated this week
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950May 8, 2019Updated 6 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,877Feb 3, 2026Updated last week