malice-plugins / pdfLinks
Malice PDF Plugin
☆16Updated 7 years ago
Alternatives and similar repositories for pdf
Users that are interested in pdf are comparing it to the libraries listed below
Sorting:
- Malice Office/OLE/RTF Plugin☆13Updated 7 years ago
- Download a Bunch of Malware for Demos and Testing☆13Updated 7 years ago
- Tools for parsing rulesets using the exact grammar as YARA. Written in Go.☆85Updated 3 years ago
- Yara rules for detecting malware☆23Updated 4 months ago
- Malice AntiVirus Plugins☆118Updated 7 years ago
- Malice PExecutable Plugin☆16Updated 4 years ago
- Malice Yara Plugin☆30Updated 6 years ago
- Process HTTP Pcaps With YARA☆108Updated 12 years ago
- Telsy CTI Research Team☆57Updated 5 years ago
- Handy scripts to speed up malware analysis☆35Updated 2 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Updated 2 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 7 years ago
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Updated 9 years ago
- Parse YARA rules and operate over them more easily.☆195Updated last year
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Updated 8 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆81Updated 4 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Updated 2 years ago
- Yara syntax highlighting☆25Updated 4 years ago
- Python OpenIOC Editor☆18Updated 10 years ago
- a modified version base on Tracecorn☆20Updated 6 years ago
- Community-based integrated malware identification system☆81Updated 3 years ago
- Various config files obtained during malware analysis☆67Updated 7 years ago
- Event Log Analysis Tools☆31Updated 9 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- ☆27Updated 2 years ago
- Yara rules for quick reverse engineering of malware.☆19Updated 10 years ago