Scripts for dealing with various ek's
☆69Feb 2, 2017Updated 9 years ago
Alternatives and similar repositories for ekdeco
Users that are interested in ekdeco are comparing it to the libraries listed below
Sorting:
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- ☆29Feb 25, 2017Updated 9 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- ☆17Mar 22, 2018Updated 7 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- Your bag of handy codes for malware researchers☆120Mar 20, 2020Updated 5 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆294Sep 30, 2023Updated 2 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- C++ application that uses memory and code hooks to detect packers☆275Mar 5, 2018Updated 7 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- ☆82Jul 23, 2019Updated 6 years ago
- zer0m0n driver for cuckoo sandbox☆87Jul 12, 2016Updated 9 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- The pyspresso package is a Python-based framework for debugging Java.☆51Jun 17, 2016Updated 9 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,118Jul 10, 2024Updated last year
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago