malware-analysis
Here are 512 public repositories matching this topic...
-
Updated
Apr 11, 2020
-
Updated
May 22, 2020 - Python
I am not sure how I should make such a request and forgive me if this is the incorrect way to ask.
How can I get a copy of the Petya document that was in the word document spread via MeDoc?
I have seen some links but they're dead and I cannot access them.
Does anyone have a copy ?
-
Updated
May 20, 2020
Right now the process isn't documented and is done by calling different classes in the project. Make a gradle task and document it a bit to make it easier for people to update it themselves.
Related discussion: CalebFenton/simplify#57
-
Updated
May 19, 2020 - Python
As of GDB 8.3 RISCV is supported.hope add basic support for RISC-V
Hello everyone!
I have a few doubts on how events are handled across misp instances and Orgs. As I still haven't complete domain of the code and my curiosity is killing me, I'm coming here to ask help =]
- In the situation a site admin edit an event from another org and publish it. What exactly will happen with that information? Supposing it has a distribution level as "All communities".
Wil
-
Updated
May 20, 2020 - PowerShell
-
Updated
May 22, 2020 - C++
-
Updated
May 22, 2020 - YARA
In the documentation https://github.com/decalage2/oletools/wiki/olevba, it says "MS Office files encrypted with a password are also supported, because VBA macro code is never encrypted, only the content of the document". This makes me think, for an encrypted office file, olevba can extract the macro with or without a password provided. However, this is not the case. olevba seems only extracts the
-
Updated
May 20, 2020 - C++
-
Updated
Mar 24, 2020 - Python
-
Updated
May 18, 2020
-
Updated
Nov 29, 2017 - Python
There may be some overlap with other signatures, need to verify these samples are 100% independent;
3f98e8d89e42ecafadb529e96c8305707c4a42d9ca97500b91b8da2fc93e07c3
b7a0d51599ff8955f0f77bd946c92433d5241e14fa84e6cbe49e0ad98898ad94
d64e1e2d0847becd4a4cd9c5804e42093719c77c15b2560c2c8bc993e90dda3b
963ee42c96a25f4a5413d8c4c455575e473516aa58c55b575e86a4fbae4aa3aa
bd6d7d8e519a3ba240d8a18d1b22
-
Updated
Apr 7, 2020 - Python
-
Updated
Jul 11, 2019
-
Updated
Aug 10, 2019 - Python
-
Updated
May 7, 2020 - Python
-
Updated
Mar 17, 2019 - C++
Parsing error on this sample: https://app.any.run/tasks/2be2b38f-4de2-4b48-8ae5-67bda9eecbaf
-------------------------------------------------------------------------------
PARSING VBA CODE:
INFO parsed Sub z55e6df583 ([ByVal s2b7d47c629 as String]): 14 statement(s)
INFO parsed Sub Document_Open (): 5 statement(s)
INFO parsed Function tfaca84885f ([ByVal zd77f34558c as Varian
-
Updated
Oct 13, 2019 - Python
-
Updated
May 20, 2020 - C
-
Updated
Feb 17, 2020
Improve this page
Add a description, image, and links to the malware-analysis topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the malware-analysis topic, visit your repo's landing page and select "manage topics."
Extended Binary Coded Decimal Interchange Code (EBCDIC; /ˈɛbsɪdɪk/) is an eight-bit character encoding used mainly on IBM mainframe and IBM midrange computer operating systems. It descended from the code used with punched cards and the corresponding six-bit binary-coded decimal code used with most of IBM's computer peripherals of the late 1950s and early 196