karttoon / OneOffsLinks
Small random scripts for various things I find myself needing to repeat/automate
☆24Updated 4 years ago
Alternatives and similar repositories for OneOffs
Users that are interested in OneOffs are comparing it to the libraries listed below
Sorting:
- Various config files obtained during malware analysis☆67Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Updated 8 years ago
- Lazy Office Analyzer☆121Updated 8 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- ☆54Updated 5 years ago
- ☆82Updated 9 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 6 years ago
- ☆37Updated 9 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Some IR notes☆73Updated 9 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Updated 10 years ago
- Some dfir stuff☆31Updated 4 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- Community modules for FAME☆65Updated last month
- Modified edition of cuckoo community modules☆32Updated 6 years ago
- Extract GUIDs from .NET assemblies☆21Updated 9 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- ☆136Updated 7 years ago
- Incident Response Scripts☆30Updated 5 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆110Updated 5 years ago
- A warehouse for your malware☆136Updated 2 months ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated 2 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- ☆68Updated 8 years ago
- Reconstruct process trees from event logs☆147Updated 5 years ago
- Malware Repository Framework☆99Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- Mass static malware analysis tool☆94Updated 3 years ago