zbetcheckin / PDF_analysisLinks
Several PDF analysis reassembled with additional tips and tools
☆342Updated 2 years ago
Alternatives and similar repositories for PDF_analysis
Users that are interested in PDF_analysis are comparing it to the libraries listed below
Sorting:
- Pattern Extractor for Obfuscated Code☆300Updated 3 years ago
- Set of Yara rules for finding files using magics headers☆141Updated 5 years ago
- For all these times you're asking yourself "what is this panel again?"☆259Updated 2 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆279Updated 3 years ago
- Tool to help analyze PDF files☆187Updated 11 years ago
- Differential Analysis of Malware in Memory☆214Updated 8 years ago
- Balbuzard is a package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain na…☆140Updated 5 years ago
- Scripts to analyze stuff☆147Updated 4 months ago
- Miscellaneous Malware RE☆196Updated 3 years ago
- Collaborative malware analysis framework☆377Updated 6 years ago
- A malware analysis and classification tool.☆190Updated 3 years ago
- Web App for Volatility framework☆389Updated 4 months ago
- Allows you to quickly query a Windows machine for RAM artifacts☆220Updated 5 years ago
- repository of tools & resources of the MMD team☆136Updated 3 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆272Updated 4 years ago
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆239Updated 2 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆39Updated 6 years ago
- A modern Python-3-based alternative to RegRipper☆201Updated 7 months ago
- Malware Analyst's Cookbook stuffs☆161Updated 10 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆145Updated 4 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆201Updated 8 months ago
- The DFRWS 2018 challenge (extended into 2019) is the second in a series of challenges dealing with Internet of Things (IoT). IoT is defin…☆56Updated 4 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆96Updated 2 weeks ago
- An open source script to perform malware static analysis on Portable Executable☆318Updated 2 years ago
- Regipy is an os independent python library for parsing offline registry hives☆265Updated this week
- snake - a malware storage zoo☆217Updated 2 years ago
- General repository for compiled and uncompiled EnCase EnScripts☆46Updated 4 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆287Updated 8 years ago
- 16,432 Free Yara rules created by☆389Updated 6 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆143Updated 5 years ago