VBA analysis tools
☆25Aug 15, 2025Updated 7 months ago
Alternatives and similar repositories for SpuriousEmu
Users that are interested in SpuriousEmu are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 5 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 6 months ago
- The samples referenced in my book, Evasive Malware (No starch Press)☆53Feb 20, 2026Updated last month
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- ☆29May 10, 2020Updated 5 years ago
- ☆18Sep 4, 2017Updated 8 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- FakeOpenSmtpRelay.py is a Python3 script simulating a working open SMTP relay☆13Mar 18, 2019Updated 7 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- ☆16Mar 12, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Apr 9, 2019Updated 7 years ago
- ☆11Feb 8, 2026Updated 2 months ago
- TA505 unpacker Python 2.7☆46Jun 22, 2020Updated 5 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Yara syntax highlighting☆25Sep 4, 2021Updated 4 years ago
- Binary Deobfuscation Series☆21Nov 20, 2019Updated 6 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- scripts/plugins for IDA Pro☆178Jan 10, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- a noodly Amaranth HDL-wrapper for FPGA SerDes' presenting a PIPE PHY interface☆31Dec 6, 2021Updated 4 years ago
- Automatically generate AV byte signatures from sets of similar binaries.☆286Dec 10, 2024Updated last year
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- ☆25Jan 8, 2024Updated 2 years ago
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 9 years ago
- Symbol hash for ELF files☆116Feb 9, 2022Updated 4 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- Set of plugins and library for dynamic pdb generation and synchronisation☆39May 3, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Bare Knuckled AV Breaking☆58Aug 30, 2018Updated 7 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆24Jun 29, 2025Updated 9 months ago
- Lightweight Microsoft OLE file parser in pure Python☆20Oct 17, 2019Updated 6 years ago
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago