Royal Road RTF Weaponizer object decoder
☆24Sep 26, 2024Updated last year
Alternatives and similar repositories for rr_decoder
Users that are interested in rr_decoder are comparing it to the libraries listed below
Sorting:
- A simple IDA Pro plugin to show all HexRays decompiler comments written by user☆23Sep 3, 2021Updated 4 years ago
- ☆32Apr 24, 2022Updated 3 years ago
- Golang parser for OLE files☆33Dec 4, 2025Updated 3 months ago
- A collection of modules and scripts to help with analyzing Nim binaries☆83Oct 7, 2024Updated last year
- ☆27Feb 6, 2022Updated 4 years ago
- ☆64Apr 1, 2021Updated 4 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- A golang CLI tool to download malware from a variety of sources.☆151Jul 3, 2025Updated 8 months ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Pure Go bindings for Zydis.☆13Jul 14, 2024Updated last year
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- A ProcessMonitor visualization application written in rust.☆184Aug 6, 2023Updated 2 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Parse .NET executable files.☆85Jan 31, 2026Updated last month
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- C# implementation to produce ROR-13 numeric hash for given function API name☆34May 26, 2019Updated 6 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- ☆15Jun 5, 2019Updated 6 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- ☆11Mar 12, 2021Updated 5 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated 2 months ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Nim-IDA-FLIRT-Generator☆20Dec 5, 2023Updated 2 years ago
- A simple C# executable that invokes an arbitrary method of an arbitrary C# DLL☆139Mar 24, 2024Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- Gandcrab v5.2 decryption scripts☆16Jan 10, 2020Updated 6 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- A Python script that decodes USB keyboard packet capture hex data.☆13Nov 17, 2021Updated 4 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- Web Application for domain name monitoring / alerting☆65Aug 1, 2024Updated last year
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆83May 12, 2022Updated 3 years ago
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.☆165Oct 24, 2022Updated 3 years ago