tehsyntx / loffice
Lazy Office Analyzer
☆119Updated 8 years ago
Alternatives and similar repositories for loffice:
Users that are interested in loffice are comparing it to the libraries listed below
- ☆82Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆115Updated 8 months ago
- PowerShell No Agent Hunting☆109Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Python script to decode common encoded PowerShell scripts☆216Updated 6 years ago
- ☆134Updated 6 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆85Updated 7 years ago
- Smart DLL execution for malware analysis in sandbox systems☆143Updated 10 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- Some IR notes☆73Updated 8 years ago
- Malware Repository Framework☆100Updated 6 years ago
- Page File analysis tools.☆125Updated 9 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆74Updated 3 years ago
- Reconstruct process trees from event logs☆147Updated 4 years ago
- ☆108Updated 7 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- A collection of infosec related scripts and information.☆53Updated 4 months ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆132Updated 2 years ago
- PE Import Hash Generator☆75Updated 7 years ago
- Various public documents, whitepapers and articles about APT campaigns☆54Updated 8 years ago
- ☆113Updated 7 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- A taxonomy and dictionary of malware behaviors.☆42Updated 5 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago