lasq88 / deobfuscate
Python script to automatically deobfuscate malware code
☆59Updated 6 years ago
Alternatives and similar repositories for deobfuscate:
Users that are interested in deobfuscate are comparing it to the libraries listed below
- Various scripts for different malware families☆106Updated 4 years ago
- Process HTTP Pcaps With YARA☆102Updated 11 years ago
- Static based decoders for malware samples☆93Updated 4 years ago
- ☆134Updated 6 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆86Updated 7 years ago
- ☆43Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- A Simple PE File Heuristics Scanners☆49Updated 6 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆13Updated 6 years ago
- A Maltego transform for VirusTotal Submitter Information☆34Updated 5 years ago
- Malware samples observed in the wild from time to time☆12Updated 5 years ago
- Landing page for MAEC docs☆20Updated 2 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- A python script that can detect and parse loki-bot (malware) related network traffic. This script can be helpful to DFIR analysts and sec…☆13Updated 3 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆78Updated 7 years ago
- Telsy CTI Research Team