Generate YARA rules for OOXML documents.
☆38Jun 1, 2023Updated 2 years ago
Alternatives and similar repositories for apooxml
Users that are interested in apooxml are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 2 months ago
- Exploits for YARA 3.7.1 & 3.8.1☆37Dec 20, 2018Updated 7 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- A git history of Windows filesystems☆77Aug 21, 2020Updated 5 years ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆37Mar 20, 2022Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- This is a python tool aiming to make using TheHive webhooks easier.☆28Oct 23, 2020Updated 5 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 3 months ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- Community modules for FAME☆65Dec 16, 2025Updated 3 months ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆98Oct 4, 2022Updated 3 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Aug 25, 2016Updated 9 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- JIRA CLI☆20Sep 16, 2021Updated 4 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Invoke-LiveResponse☆150Feb 22, 2022Updated 4 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Experiment in implementation of an instrumentation for American Fuzzy Lop using DynamoRIO☆15Jul 29, 2017Updated 8 years ago