Royal Road RTF Weaponizer object decoder
☆24Sep 26, 2024Updated last year
Alternatives and similar repositories for rr_decoder
Users that are interested in rr_decoder are comparing it to the libraries listed below
Sorting:
- Python bindings for the Zydis disassembler library☆17Jul 2, 2019Updated 6 years ago
- ☆27Feb 6, 2022Updated 4 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- Golang parser for OLE files☆33Dec 4, 2025Updated 2 months ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated last month
- Binary Ninja plugin for interacting with the OALabs HashDB service☆20Nov 1, 2024Updated last year
- Default project สำหรับงาน data science ที่รวมเอา library หลักๆ ที่ต้องใช้บน Python 3.11 ไว้ให้แล้วใน requirements.txt☆21Feb 6, 2024Updated 2 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Generate similar looking strings with similar looking Unicode characters.☆14Mar 2, 2017Updated 8 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- I'll post some malware analysis from time to time.☆24Apr 3, 2021Updated 4 years ago
- Parse .NET executable files.☆85Jan 31, 2026Updated last month
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Apr 10, 2022Updated 3 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 5 months ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- A simple IDA Pro plugin to show all HexRays decompiler comments written by user☆22Sep 3, 2021Updated 4 years ago
- ☆32Apr 24, 2022Updated 3 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- Simple C++ PoC of SeDebugPrivilege Privesc☆30Feb 12, 2024Updated 2 years ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆116Feb 8, 2026Updated 3 weeks ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Python course for adult self starters☆15Dec 4, 2024Updated last year