kirk-sayre-work / ViperMonkey
A VBA parser and emulation engine to analyze malicious macros.
☆96Updated this week
Alternatives and similar repositories for ViperMonkey
Users that are interested in ViperMonkey are comparing it to the libraries listed below
Sorting:
- c2 traffic☆188Updated 2 years ago
- Invoke-LiveResponse☆147Updated 3 years ago
- Random hunting ordiented yara rules☆96Updated 2 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- ☆302Updated 4 years ago
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago
- Various capabilities for static malware analysis.☆78Updated 8 months ago
- Automatically create YARA rules from malicious documents.☆211Updated 3 years ago
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 5 months ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- Signature engine for all your logs☆170Updated last year
- "Evolving AppCompat/AmCache data analysis beyond grep"☆203Updated 3 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated this week
- Dump of organized knowledge on DFIR☆134Updated 3 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 4 years ago
- Yet another registry parser☆132Updated 3 years ago
- A modern Python-3-based alternative to RegRipper☆195Updated last month
- Set of Yara rules for finding files using magics headers☆137Updated 4 years ago
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Sigma Detection Rule Repository☆88Updated 4 years ago
- ☆125Updated 3 months ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆165Updated 6 years ago
- A repository that maps API calls to Sysmon Event ID's.☆120Updated 2 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆137Updated 2 years ago
- ☆116Updated last year
- Personal compilation of APT malware from whitepaper releases, documents and own research☆261Updated 6 years ago
- A rewrite of mactime, a bodyfile reader☆37Updated 9 months ago
- A YARA Rule Performance Measurement Tool☆59Updated last year