Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
☆51Sep 6, 2023Updated 2 years ago
Alternatives and similar repositories for static_file_analysis
Users that are interested in static_file_analysis are comparing it to the libraries listed below
Sorting:
- Compressed Rich Text Format (RTF) compression and decompression in Python☆23Jun 29, 2025Updated 8 months ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- Lightweight Microsoft OLE file parser in pure Python☆20Oct 17, 2019Updated 6 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 6 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Jun 28, 2025Updated 8 months ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- Golang parser for OLE files☆33Dec 4, 2025Updated 2 months ago
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- A mapping of used malware names to commonly known family names☆62Feb 21, 2023Updated 3 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- analysis of visual basic code☆47Mar 25, 2018Updated 7 years ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated last month
- Distributed malware processing framework based on Python, Redis and S3.☆461Dec 1, 2025Updated 2 months ago
- Find abuse contacts for observables☆69Nov 10, 2022Updated 3 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- ☆21Apr 19, 2024Updated last year
- Parse YARA rules and operate over them more easily.☆194Feb 6, 2025Updated last year
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 8 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- Machine Learning for malicious Javascript code detection☆19Jan 13, 2017Updated 9 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Polyglot detector☆23Jun 5, 2025Updated 8 months ago