Modular malware analysis artifact collection and correlation framework
☆54Apr 23, 2024Updated last year
Alternatives and similar repositories for subparse
Users that are interested in subparse are comparing it to the libraries listed below
Sorting:
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- ☆13Mar 1, 2024Updated last year
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Norimaci is a simple and lightweight malware analysis sandbox for macOS☆71Mar 3, 2020Updated 5 years ago
- ☆39Jan 24, 2024Updated 2 years ago
- ☆18Dec 9, 2023Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆46Mar 15, 2024Updated last year
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Aug 2, 2023Updated 2 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- ☆226Sep 8, 2022Updated 3 years ago
- I have documented all of the AMSI patches that I learned till now☆74Nov 4, 2025Updated 3 months ago
- THOR Thunderstorm Collectors☆25Updated this week
- ☆27Aug 18, 2023Updated 2 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Jun 26, 2023Updated 2 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- a component of red teaming for generate route map.☆11Aug 30, 2024Updated last year
- Repository of vulnerabilities disclosed by ESET☆29Jul 13, 2022Updated 3 years ago