malice-plugins / office
Malice Office/OLE/RTF Plugin
☆13Updated 6 years ago
Alternatives and similar repositories for office:
Users that are interested in office are comparing it to the libraries listed below
- Malice PExecutable Plugin☆16Updated 4 years ago
- Download a Bunch of Malware for Demos and Testing☆13Updated 6 years ago
- IoC's, PCRE's, YARA's etc☆24Updated 3 weeks ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20Updated 5 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- ssdeep cluster analysis for malware files☆30Updated 4 years ago
- ☆25Updated 4 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Malware samples observed in the wild from time to time☆12Updated 5 years ago
- ☆15Updated 4 years ago
- Official Malice Plugins☆18Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Updated 8 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- API functions for Malware Research☆35Updated 5 years ago
- ☆17Updated 4 months ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- Random stuff for FlareOn☆13Updated 6 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Malice PDF Plugin☆16Updated 6 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- ☆13Updated 4 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- ☆24Updated 9 years ago