pafishmacro
Malware detector
An Office document designed to test and analyze malware detection systems
Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques implemented by malicious documents.
278 stars
24 watching
72 forks
Language: Visual Basic
last commit: over 8 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A tool to detect virtual machines and malware analysis environments by analyzing system behavior similar to malware detection methods. | 3,443 |
| | Provides an API wrapper to interact with the Joe Sandbox API for analyzing malicious files. | 64 |
| | Generates malicious macros to bypass application whitelisting and execute powershell or shellcode via MSBuild. | 495 |
| | Provides a set of standardized indicators to help detect and assess malware presence | 10 |
| | Sandbox for analyzing and understanding JavaScript malware | 465 |
| | Detects potential Cobalt Strike malware by analyzing memory allocation patterns during code execution | 272 |
| | A collection of YARA rules for detecting malware and other malicious files. | 9 |
| | A mobile app jailbreak detector written in C# for Xamarin. | 19 |
| | Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. | 77 |
| | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
| | A tool that identifies and filters potential Server-Side Request Forgery (SSRF) vulnerabilities in cloud environments by probing external hosts. | 599 |
| | A PowerShell script designed to help Incident Responders discover potential indicators of compromise on Windows hosts by scanning for various persistence techniques. | 310 |
| | Analyzes malware files to detect suspicious behavior by extracting meta information and features. | 1 |
| | This repository contains signature files for detecting malicious software | 533 |
| | Tools to extract configuration data from known malware samples in memory images. | 483 |