Scripts for dealing with various ek's
☆69Feb 2, 2017Updated 9 years ago
Alternatives and similar repositories for ekdeco
Users that are interested in ekdeco are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- ☆29Feb 25, 2017Updated 9 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- ☆17Mar 22, 2018Updated 8 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- Your bag of handy codes for malware researchers☆120Mar 20, 2020Updated 6 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆269Jun 15, 2021Updated 4 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- ☆32Jun 19, 2024Updated last year
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- C++ application that uses memory and code hooks to detect packers☆275Mar 5, 2018Updated 8 years ago
- ☆82Jul 23, 2019Updated 6 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Oct 12, 2020Updated 5 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago