DarkSide-Config-Extract

Ransomware config extractor

Extracts configuration data from ransomware binaries

GitHub

31 stars
9 watching
10 forks
last commit: about 3 years ago
ransomwarereverse-engineering

Related projects:

Repository Description Stars
advanced-threat-research/dotdumper An automated tool for analyzing .NET-based malware samples by logging function calls and dumping memory segments. 248
sk3ptre/androidmalware_2020 Collects and documents various Android malware samples from 2020, including their characteristics and behaviors. 284
idiom/pftriage Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. 77
cristianzsh/freki A platform for analyzing malware and performing reverse engineering on binary files 422
droidefense/engine An Android malware analysis framework that generates detailed reports on executable code behavior 473
jpcertcc/malconfscan Tools to extract configuration data from known malware samples in memory images. 485
telekom-security/malware_analysis An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. 110
acsdavid97/dotnethooker Tools for tracing and analyzing .NET function calls and argument dumps to aid in reverse engineering malware. 5
realitynet/android-forensics-references A collection of references and resources for analyzing Android devices and applications. 287
sk3ptre/androidmalware_2019 A collection of Android malware samples from 2019, showcasing various types of threats and techniques used by attackers. 246
nuxmorpheus/ehrem Complementing educational resources on malware reverse engineering and low-level programming 2
uqcyber/coldpress Automates malware analysis workflow by extracting features and indicators of compromise from malicious files using various tools and libraries. 16
sapphirex00/threat-hunting A collection of threat intelligence resources and tools for analyzing APT malware 255
sk3ptre/androidmalware_2018 A repository documenting popular Android malware infections from 2018, along with their corresponding samples and characteristics. 44
exp-sky/xkungfoo-2013 Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods 6