sevzero / honeybadger
Javascript deobfuscation tool
☆17Updated 6 years ago
Alternatives and similar repositories for honeybadger:
Users that are interested in honeybadger are comparing it to the libraries listed below
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- A warehouse for your malware☆134Updated 11 years ago
- Yara intergrated into BurpSuite☆46Updated 8 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 7 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Process HTTP Pcaps With YARA☆102Updated 11 years ago
- A Generic Windows Memory Scraping Tool☆70Updated 7 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- ☆16Updated 10 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- ☆68Updated 7 years ago
- A Windows Event Processing Utility☆46Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Shared yara rules☆30Updated 11 years ago
- Useful scripts, rules etc. for use with YARA☆27Updated 4 years ago
- An offensive Powershell console☆30Updated 9 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- newly registered domain name/brand infringement detector☆22Updated 3 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago