Lazy Office Analyzer
☆121Feb 15, 2017Updated 9 years ago
Alternatives and similar repositories for loffice
Users that are interested in loffice are comparing it to the libraries listed below
Sorting:
- VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls☆153Mar 17, 2016Updated 9 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆293Jun 27, 2017Updated 8 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆476Jun 16, 2023Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- A tool for studying JavaScript malware.☆666Nov 22, 2024Updated last year
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Your bag of handy codes for malware researchers☆120Mar 20, 2020Updated 5 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Docker container for MISP☆96Jun 20, 2018Updated 7 years ago
- Comae Hibernation File Decompressor☆156Apr 1, 2023Updated 2 years ago
- A static analyzer for PE executables.☆1,107Updated this week
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 2 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆416Nov 4, 2022Updated 3 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆388Jun 25, 2024Updated last year
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- Summit Route End Point Protection - Server code☆11Apr 10, 2016Updated 9 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- A VBA p-code disassembler☆484Jun 12, 2021Updated 4 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆141Apr 16, 2021Updated 4 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- A YARA-integrated process denial framework for Windows☆398Feb 15, 2020Updated 6 years ago
- Dynamic instrumentation tool for Adobe Flash Player built on Intel Pin☆148Aug 5, 2014Updated 11 years ago