DC3-MWCP
Malware parser
A framework for parsing configuration information from malware to facilitate analysis and automation.
DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, filenames, and mutex names.
305 stars
43 watching
59 forks
Language: Python
last commit: over 1 year ago
Linked from 1 awesome list
automationconfig-dumpframeworkmalware-analysismalware-automationpython
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Automated malware collection and analysis system with storage, tracking, and visualization capabilities | 330 |
| | Analyzes network traffic to detect malware communication and behavior | 1,158 |
| | Automated malware analysis tool that tests suspicious files or links in a sandboxed environment | 652 |
| | Tools to extract configuration data from known malware samples in memory images. | 483 |
| | A repository of publicly available malware exploits targeting specific infrastructure. | 537 |
| | A framework for building flexible and lightweight malware analysis pipelines | 395 |
| | Repository containing malware samples and decompiled code to aid in security research and development of defense solutions | 233 |
| | An ingestion and processing framework for malware and indicator data from various feeds. | 104 |
| | A tool for generating malware payloads using MSBuild and PowerShell, allowing for conditional execution based on user domain or registry conditions. | 1,480 |
| | A collection of reusable scripts and tools for analyzing malicious software | 75 |
| | A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment. | 2,043 |
| | A tool to extract configuration from F-Secure C3 Relay executable memory dumps | 16 |
| | An engine for parsing network device configurations and converting them to structured data in YAML | 135 |
| | An open-source reinforcement learning framework to generate adversarial examples for malware classification models. | 41 |
| | A set of commands for high-speed processing of large-scale CSV data | 33 |