Royal Road RTF Weaponizer object decoder
☆24Sep 26, 2024Updated last year
Alternatives and similar repositories for rr_decoder
Users that are interested in rr_decoder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python bindings for the Zydis disassembler library☆17Jul 2, 2019Updated 6 years ago
- ☆31Apr 24, 2022Updated 3 years ago
- ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java☆15Sep 2, 2024Updated last year
- Golang parser for OLE files☆33Dec 4, 2025Updated 4 months ago
- ☆27Feb 6, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆64Apr 1, 2021Updated 5 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- A golang CLI tool to download malware from a variety of sources.☆151Jul 3, 2025Updated 9 months ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Pure Go bindings for Zydis.☆13Jul 14, 2024Updated last year
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- A ProcessMonitor visualization application written in rust.☆184Aug 6, 2023Updated 2 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- I'll post some malware analysis from time to time.☆24Apr 3, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Parse .NET executable files.☆86Jan 31, 2026Updated 2 months ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- api-tracer is a tiny (useless) tracer☆17Feb 28, 2023Updated 3 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆35May 26, 2019Updated 6 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- C2 Active Scanner☆57Jun 19, 2024Updated last year
- ☆15Jun 5, 2019Updated 6 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆38Jan 3, 2022Updated 4 years ago
- ☆11Mar 12, 2021Updated 5 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated 3 months ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 2 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Nim-IDA-FLIRT-Generator☆20Dec 5, 2023Updated 2 years ago
- A simple C# executable that invokes an arbitrary method of an arbitrary C# DLL☆140Mar 24, 2024Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Gandcrab v5.2 decryption scripts☆16Jan 10, 2020Updated 6 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- ☆16Apr 30, 2024Updated last year
- ☆18Apr 4, 2019Updated 7 years ago
- Web Application for domain name monitoring / alerting☆66Aug 1, 2024Updated last year
- IDA Pro plugin for recognizing known hashes of API function names☆83May 12, 2022Updated 3 years ago