Emu-strings project - JScript/VBScript automated dropper analysis system
☆18Mar 25, 2021Updated 4 years ago
Alternatives and similar repositories for emu-strings
Users that are interested in emu-strings are comparing it to the libraries listed below
Sorting:
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- Python Library for ConfigExtractor☆15Feb 24, 2026Updated 3 weeks ago
- VBA analysis tools☆25Aug 15, 2025Updated 7 months ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- FakeOpenSmtpRelay.py is a Python3 script simulating a working open SMTP relay☆13Mar 18, 2019Updated 7 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Aug 13, 2016Updated 9 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- TA505 unpacker Python 2.7☆46Jun 22, 2020Updated 5 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Windows Crypto API compatible decryption/encryption for python☆50Dec 11, 2022Updated 3 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆263Mar 27, 2023Updated 2 years ago
- ☆25Jan 8, 2024Updated 2 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- ☆17Mar 29, 2021Updated 4 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- ☆14Oct 8, 2024Updated last year
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- ☆83Jan 31, 2020Updated 6 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- ☆29May 10, 2020Updated 5 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Miscellaneous JScript, VBScript, WSF XML, HTA HTML, PowerShell, Batch, etc. for Windows☆15Oct 30, 2017Updated 8 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.☆165Oct 24, 2022Updated 3 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- Automatically generate AV byte signatures from sets of similar binaries.☆288Dec 10, 2024Updated last year
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- A Rust command-line tool for decoding Alpha2-based shellcode.☆11Dec 16, 2020Updated 5 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Jun 23, 2017Updated 8 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago