VBASeismograph
VBA detector
Detects VBA code modifications in compiled Office files by comparing with the original source code.
A tool for detecting VBA stomping.
96 stars
7 watching
21 forks
Language: Python
last commit: over 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
malwarecantfly/vba2graph | Analyzes VBA code to generate visual call graphs and highlights potential malicious keywords | 274 |
packing-box/pypackerdetect | Detects whether an executable is packed using various methods and signatures. | 21 |
securingsam/krackdetector | Detects KRACK attacks and disconnects client devices from the network. | 179 |
usualsuspect/malscan | A tool to detect and analyze malicious code in process memory by executing Python scripts on YARA matches | 12 |
cylance/pypackerdetect | An executable detection tool using PE parsing and machine learning signatures to identify packed samples. | 29 |
bonnetn/vba-obfuscator | A tool to protect VBA macros by obfuscating their code to evade antivirus signatures | 150 |
ibm/max-text-sentiment-classifier | Detects sentiment in short pieces of text using a pre-trained BERT model fine-tuned on the IBM Claims Dataset. | 58 |
mrphrazer/obfuscation_detection | Automatically detects obfuscated code and other complex code constructs in binaries to aid reverse engineering. | 575 |
jingzhang617/cod-rank-localize-and-segment | Develops a system to detect, segment, and rank camouflaged objects in images. | 74 |
stvemillertime/conventionengine | Detects and identifies suspicious PDB paths in malware files using Yara rules. | 37 |
baalmor/cve-ape | Automates CVE vulnerability scanning for Linux packages | 4 |
mbj/mutant | Automated code review tool with mutation testing to simplify and improve code quality | 1,956 |
nsmfoo/antivmdetection | A tool to create templates making VirtualBox VM detection harder | 712 |
philips-labs/tabia | Analyzes codebases to extract characteristics and provides insights on their properties | 12 |
3coresec/automata | Automated tool to detect errors in security monitoring and measure effectiveness of SIEM rules against various behaviors. | 51 |