silascutler / MiscMalwareLinks
Misc malware stuff
☆11Updated 5 years ago
Alternatives and similar repositories for MiscMalware
Users that are interested in MiscMalware are comparing it to the libraries listed below
Sorting:
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Plugins for the Viper Framework☆14Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- Some rules, scripts of some use to us☆11Updated last year
- Various snippets created during malware analysis☆22Updated 7 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Updated 4 years ago
- Development guide for Volatility Plugins☆22Updated 8 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆75Updated 6 years ago
- ☆54Updated 5 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 6 years ago
- API functions for Malware Research☆35Updated 6 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Updated last month
- Material from our CANAPE workshop☆32Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Parses Java Cache IDX files☆40Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- Registry Miner☆14Updated 7 years ago
- ☆16Updated 8 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Updated 7 years ago
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 8 years ago
- Simple DDE object detector☆56Updated 8 years ago
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 8 years ago
- Set of utilities for getting information about Windows Events☆15Updated 7 years ago