reecdeep / HiveV5_keystream_decryptor
bad stuffs by bad guys
☆47Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for HiveV5_keystream_decryptor
- ☆64Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- Hive v5 file decryption algorithm☆34Updated last year
- Imphash-like calculation on Golang binaries☆47Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆52Updated 6 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆49Updated 7 months ago
- ☆21Updated last month
- Configuration Extractors for Malware☆54Updated last month
- Royal Road RTF Weaponizer object decoder☆24Updated last month
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆56Updated last year
- Configuration Extractor for BlackCat Ransomware☆30Updated 2 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆29Updated last year
- ☆22Updated 5 months ago
- Malware Configuration Extraction Modules☆47Updated 11 months ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆43Updated 3 years ago
- Python based CLI for MalwareBazaar☆36Updated 3 weeks ago
- Scripts, Yara rules and other files developed during malware investigations☆24Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- ☆31Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- Autopsy Module to analyze Registry Hives☆13Updated 2 years ago
- ☆27Updated 3 months ago
- General malware analysis stuff☆35Updated 2 months ago
- ☆14Updated 2 years ago
- ☆66Updated 11 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆47Updated 7 months ago