mak / libzpy
library to decode/parse zeus-like configuration files
☆29Updated 6 years ago
Alternatives and similar repositories for libzpy:
Users that are interested in libzpy are comparing it to the libraries listed below
- Volatility Plugins☆21Updated 9 years ago
- ☆16Updated 10 years ago
- ☆19Updated 6 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- Malware.lu configuration extractor☆24Updated 10 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- Collection of my Python Scripts☆41Updated 4 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- Tools☆13Updated last year
- zer0m0n driver for cuckoo sandbox☆21Updated 9 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆37Updated 8 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- QEMU with rVMI extensions☆25Updated 7 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 8 years ago
- Frontend for Codex Gigas☆21Updated 7 years ago
- IDATACO IDA Pro Plugin☆47Updated 8 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- A Volatility plugin for finding sqlite database rows☆22Updated 5 years ago
- Test suite for bypassing Malware sandboxes.☆38Updated 10 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- ripPE - section extractor and profiler for PE file analysis☆32Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Automated memory forensics analysis☆32Updated 5 years ago