kevoreilly / CAPELinks
Malware Configuration And Payload Extraction
☆20Updated 5 years ago
Alternatives and similar repositories for CAPE
Users that are interested in CAPE are comparing it to the libraries listed below
Sorting:
- Malware similarity platform with modularity in mind.☆80Updated 4 years ago
- Community modules for FAME☆65Updated last month
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Random hunting ordiented yara rules☆98Updated 2 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Updated 2 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- Lazy Office Analyzer☆121Updated 8 years ago
- ☆84Updated 5 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Updated 2 years ago
- ☆128Updated 11 months ago
- Simple yara rule manager☆66Updated 3 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆97Updated 3 weeks ago
- Validates yara rules and tries to repair the broken ones.☆41Updated 5 years ago
- Automatic YARA rule generation for Malpedia☆166Updated 3 years ago
- A YARA Rule Performance Measurement Tool☆61Updated last year
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Yara rules for detecting malware☆23Updated 4 months ago
- ☆63Updated 4 years ago
- A rewrite of mactime, a bodyfile reader☆39Updated last year
- A Yara rule generator for finding related samples and hunting☆162Updated 3 years ago
- Web based Manager for Yara Rules☆58Updated 5 years ago
- c2 traffic☆193Updated 2 years ago
- ☆54Updated 5 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- Collection of YARA signatures from individual research☆45Updated 2 years ago
- Yara Based Detection Engine for web browsers☆49Updated 4 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆145Updated 5 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Updated 3 weeks ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 5 years ago
- A taxonomy and dictionary of malware behaviors.☆43Updated 6 years ago