WIP Emotet Control Flow Unflattening using miasm and radare2
☆23Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for EmotetCFU
Users that are interested in EmotetCFU are comparing it to the libraries listed below
Sorting:
- ☆83Jan 31, 2020Updated 6 years ago
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- app.any.run malware submissions client☆17Jan 2, 2020Updated 6 years ago
- Javascript deobfuscation tool☆17Apr 6, 2018Updated 7 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆57Jan 16, 2020Updated 6 years ago
- ☆73Sep 4, 2023Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- Windows link file (shortcuts) examiner☆68Jun 9, 2024Updated last year
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- GigaDrop allows you to easily and securely share files directly between devices without uploading them to any server first☆11Sep 4, 2022Updated 3 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Dec 21, 2023Updated 2 years ago
- Run TFLITE models on the web☆12Jan 2, 2022Updated 4 years ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆83Jun 6, 2024Updated last year
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Jun 29, 2019Updated 6 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Feb 2, 2018Updated 8 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 7 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆10May 10, 2024Updated last year
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 5 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- A Sample App to Demonstrate React Native and FastAPI Integration☆14Jan 26, 2023Updated 3 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- Implement MTCNN with Tensorflow.js. A face detection framework with MTCNN and Tensorflow.js☆11Jun 30, 2022Updated 3 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- ☆117Dec 11, 2025Updated 2 months ago
- Official VirusTotal plugin for IDA Pro☆179Feb 4, 2026Updated 3 weeks ago
- Configuration MinIO with Nginx on Docker☆15Oct 30, 2023Updated 2 years ago
- A lightweight hypervisor for forensics☆12Sep 1, 2015Updated 10 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- ☆15May 6, 2021Updated 4 years ago
- KeePass Two-Channel Auto-Type Obfuscation Keylogger☆10Feb 3, 2016Updated 10 years ago
- Machine learning for malware detection☆11Aug 2, 2016Updated 9 years ago