Extract AutoIt scripts embedded in PE binaries
☆235Mar 7, 2026Updated last month
Alternatives and similar repositories for AutoIt-Ripper
Users that are interested in AutoIt-Ripper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Apr 30, 2024Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Malduck is your ducky companion in malware analysis journeys☆350Jun 22, 2025Updated 9 months ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Automatic and platform-independent unpacker for Windows binaries based on emulation☆747Aug 18, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A library and cli tool to extract HWP files.☆29Dec 1, 2025Updated 4 months ago
- A tool for detecting VBA stomping.☆102Aug 4, 2022Updated 3 years ago
- ☆16Mar 12, 2026Updated 3 weeks ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- ☆35Jan 13, 2026Updated 2 months ago
- Dynamic unpacker based on PE-sieve☆803Apr 1, 2026Updated last week
- ☆118Feb 13, 2026Updated last month
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated 2 months ago
- Go symbol recovery tool☆964Mar 6, 2026Updated last month
- Windows kernel and user mode emulation.☆1,933Updated this week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,606Updated this week
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Updated this week
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92May 23, 2019Updated 6 years ago
- Kaspersky's GReAT KLara☆733Jul 24, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,959Apr 2, 2026Updated last week
- ☆1,133Dec 19, 2023Updated 2 years ago
- Simple 32/64-bit PEs loader.☆140Dec 19, 2018Updated 7 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,283Mar 26, 2026Updated 2 weeks ago
- capemon: CAPE's monitor☆146Mar 26, 2026Updated 2 weeks ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated last year
- A VBA parser and emulation engine to analyze malicious macros.☆1,118Jul 10, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆263Mar 27, 2023Updated 3 years ago
- A dynamic VMP dumper and import fixer, powered by VTIL.☆1,346Nov 4, 2020Updated 5 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,940Updated this week
- Helper idapython code for reversing kmdf drivers☆75Jul 20, 2022Updated 3 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- ☆43Nov 5, 2018Updated 7 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago