DarkSide-Config-Extract
Ransomware config extractor
Extracts configuration data from ransomware binaries
33 stars
9 watching
10 forks
last commit: over 3 years ago ransomwarereverse-engineering
Related projects:
Repository | Description | Stars |
---|---|---|
| An automated tool for analyzing .NET-based malware samples by logging function calls and dumping memory segments. | 250 |
| Collects and documents various Android malware samples from 2020, including their characteristics and behaviors. | 287 |
| Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. | 77 |
| A platform for analyzing malware and performing reverse engineering on binary files | 424 |
| An Android malware analysis framework that generates detailed reports on executable code behavior | 476 |
| Tools to extract configuration data from known malware samples in memory images. | 483 |
| An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
| Tools for tracing and analyzing .NET function calls and argument dumps to aid in reverse engineering malware. | 5 |
| A collection of references and resources for analyzing Android devices and applications. | 290 |
| A collection of Android malware samples from 2019, showcasing various types of threats and techniques used by attackers. | 247 |
| Complementing educational resources on malware reverse engineering and low-level programming | 2 |
| Automates malware analysis workflow by extracting features and indicators of compromise from malicious files using various tools and libraries. | 16 |
| A collection of threat intelligence resources and tools for analyzing APT malware | 257 |
| A repository documenting popular Android malware infections from 2018, along with their corresponding samples and characteristics. | 44 |
| Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods | 6 |