DarkSide-Config-Extract
Ransomware config extractor
Extracts configuration data from ransomware binaries
33 stars
9 watching
10 forks
last commit: about 4 years ago ransomwarereverse-engineering
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An automated tool for analyzing .NET-based malware samples by logging function calls and dumping memory segments. | 250 |
| | Collects and documents various Android malware samples from 2020, including their characteristics and behaviors. | 287 |
| | Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. | 77 |
| | A platform for analyzing malware and performing reverse engineering on binary files | 424 |
| | An Android malware analysis framework that generates detailed reports on executable code behavior | 476 |
| | Tools to extract configuration data from known malware samples in memory images. | 483 |
| | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
| | Tools for tracing and analyzing .NET function calls and argument dumps to aid in reverse engineering malware. | 5 |
| | A collection of references and resources for analyzing Android devices and applications. | 290 |
| | A collection of Android malware samples from 2019, showcasing various types of threats and techniques used by attackers. | 247 |
| | Complementing educational resources on malware reverse engineering and low-level programming | 2 |
| | Automates malware analysis workflow by extracting features and indicators of compromise from malicious files using various tools and libraries. | 16 |
| | A collection of threat intelligence resources and tools for analyzing APT malware | 257 |
| | A repository documenting popular Android malware infections from 2018, along with their corresponding samples and characteristics. | 44 |
| | Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods | 6 |