malice-plugins / office
Malice Office/OLE/RTF Plugin
☆13Updated 6 years ago
Alternatives and similar repositories for office
Users that are interested in office are comparing it to the libraries listed below
Sorting:
- Malware samples observed in the wild from time to time☆12Updated 5 years ago
- IoC's, PCRE's, YARA's etc☆24Updated last month
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Malice PExecutable Plugin☆16Updated 4 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Download a Bunch of Malware for Demos and Testing☆13Updated 6 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆11Updated last year
- Plugins for the Viper Framework☆14Updated 5 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Yaras Random☆20Updated 6 years ago
- ssdeep cluster analysis for malware files☆30Updated 4 years ago
- ☆25Updated 4 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- ☆15Updated 4 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆41Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- ☆24Updated 9 years ago
- Random stuff for FlareOn☆13Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Malice Yara Plugin☆30Updated 5 years ago
- QEMU with rVMI extensions☆25Updated 7 years ago
- ☆43Updated 6 years ago
- ☆15Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago