DC3-MWCP
Malware parser
A framework for parsing configuration information from malware to facilitate analysis and automation.
DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, filenames, and mutex names.
305 stars
43 watching
59 forks
Language: Python
last commit: 9 months ago
Linked from 1 awesome list
automationconfig-dumpframeworkmalware-analysismalware-automationpython
Related projects:
Repository | Description | Stars |
---|---|---|
| Automated malware collection and analysis system with storage, tracking, and visualization capabilities | 330 |
| Analyzes network traffic to detect malware communication and behavior | 1,158 |
| Automated malware analysis tool that tests suspicious files or links in a sandboxed environment | 652 |
| Tools to extract configuration data from known malware samples in memory images. | 483 |
| A repository of publicly available malware exploits targeting specific infrastructure. | 537 |
| A framework for building flexible and lightweight malware analysis pipelines | 395 |
| Repository containing malware samples and decompiled code to aid in security research and development of defense solutions | 233 |
| An ingestion and processing framework for malware and indicator data from various feeds. | 104 |
| A tool for generating malware payloads using MSBuild and PowerShell, allowing for conditional execution based on user domain or registry conditions. | 1,480 |
| A collection of reusable scripts and tools for analyzing malicious software | 75 |
| A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment. | 2,043 |
| A tool to extract configuration from F-Secure C3 Relay executable memory dumps | 16 |
| An engine for parsing network device configurations and converting them to structured data in YAML | 135 |
| An open-source reinforcement learning framework to generate adversarial examples for malware classification models. | 41 |
| A set of commands for high-speed processing of large-scale CSV data | 33 |