Python tool and library for decrypting and encrypting MS Office files using passwords or other keys
☆611Jan 12, 2026Updated 2 months ago
Alternatives and similar repositories for msoffcrypto-tool
Users that are interested in msoffcrypto-tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆258Mar 19, 2026Updated last week
- A VBA parser and emulation engine to analyze malicious macros.☆1,117Jul 10, 2024Updated last year
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,305Feb 14, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆13Jul 11, 2017Updated 8 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- ☆113Jun 12, 2017Updated 8 years ago
- Generating YARA rules based on binary code☆221Oct 7, 2021Updated 4 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- A VBA p-code disassembler☆484Jun 12, 2021Updated 4 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆294Jun 27, 2017Updated 8 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- ☆27Nov 4, 2015Updated 10 years ago
- Lightweight Microsoft OLE file parser in pure Python☆20Oct 17, 2019Updated 6 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- Please no pull requests for this repository. Thanks!☆2,430Mar 16, 2026Updated last week
- ☆22Jul 7, 2017Updated 8 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆136Jan 24, 2019Updated 7 years ago
- A tool for detecting VBA stomping.☆102Aug 4, 2022Updated 3 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- yarGen is a generator for YARA rules☆1,782Jan 10, 2026Updated 2 months ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,235Dec 27, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Enable custom hostname resolution without editing /etc/hosts☆10Aug 11, 2017Updated 8 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,936Updated this week
- ☆12Feb 19, 2017Updated 9 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Oct 25, 2015Updated 10 years ago