A tool for studying JavaScript malware.
☆15Apr 20, 2026Updated 2 weeks ago
Alternatives and similar repositories for box-js
Users that are interested in box-js are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Powershell sandboxing utility☆19Mar 2, 2026Updated 2 months ago
- Using plotly to perfom data visualization of ransomware leak site data☆14Feb 15, 2024Updated 2 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆98Mar 4, 2026Updated 2 months ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- Code files for CSD 310☆15Aug 19, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Docker compose Assemblyline 4 deployment (appliance and development)☆17Apr 23, 2026Updated last week
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- A dedicated repo to interact with the API of Timesketch☆12Sep 17, 2021Updated 4 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated 3 months ago
- Threat Analytics Search Chrome Extension☆12Apr 17, 2026Updated 2 weeks ago
- Python script to pull various IOCs from PDFs☆15Dec 22, 2014Updated 11 years ago
- ☆34Feb 3, 2026Updated 3 months ago
- Web interface and APIs for Assemblyline 4☆21Updated this week
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 8 years ago
- Living off the land searches for explorer and sharepoint☆97Dec 7, 2025Updated 5 months ago
- Scripts for MacOS related tasks.☆18Feb 16, 2020Updated 6 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Apr 28, 2026Updated last week
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆131Dec 22, 2023Updated 2 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- ☆28Jul 5, 2025Updated 10 months ago
- A curated list of awesome Go frameworks, libraries and software☆15May 19, 2017Updated 8 years ago
- Sample demonstrating Raw Kafka Producer/Consumer client API's☆11May 17, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Mass Triage Tools☆20Mar 10, 2026Updated last month
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 6 years ago
- BlackBerry Threat Research & Intelligence☆99Oct 20, 2023Updated 2 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆119Updated this week
- A Windows disk dumper☆24Nov 12, 2015Updated 10 years ago
- Python implementation of the CaRT library for (un)inerting files.☆53Feb 10, 2025Updated last year
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- Python client for Assemblyline 3 and 4 / Client python pour AssemblyLine 3 and 4☆23Apr 23, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆21Feb 10, 2021Updated 5 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 3 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- A cache module for Node.js that uses a two-level cache (in-memory cache for recently accessed data plus Redis for distributed caching) wi…☆25Apr 26, 2026Updated last week
- Solutions for the HellboundHackers challenges☆14Dec 16, 2019Updated 6 years ago
- Logstash Configs and Kibana Dashboards for F5 LTM & ASM☆20Nov 8, 2017Updated 8 years ago
- Converts the Clamav Virus Database definitions to YARA rules [GOLANG]☆53Feb 22, 2021Updated 5 years ago