lasq88 / deobfuscate
Python script to automatically deobfuscate malware code
☆58Updated 6 years ago
Alternatives and similar repositories for deobfuscate:
Users that are interested in deobfuscate are comparing it to the libraries listed below
- A Simple PE File Heuristics Scanners☆50Updated 5 years ago
- Various scripts for different malware families☆104Updated 3 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- ☆43Updated 6 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- VBA Reversed TCP Meterpreter Stager☆62Updated 6 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 10 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 4 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆72Updated 5 years ago
- ☆134Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆13Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Malware captured with honeypots☆36Updated 7 years ago
- Static based decoders for malware samples☆92Updated 4 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆49Updated 6 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- VBS Reversed TCP Meterpreter Stager☆86Updated 7 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- PIC code gen and loading☆14Updated 7 years ago
- Malware samples observed in the wild from time to time☆12Updated 5 years ago
- Reflective Polymorphism☆104Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆64Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago