Dc3 Mwcp

DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, filenames, and mutex names.
Alternatives To Dc3 Mwcp
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Lief4,14097513 days ago22June 17, 202382apache-2.0C++
LIEF - Library to Instrument Executable Formats
Oletools2,66533 months ago4May 09, 2022487otherPython
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
Capev21,519
3 months ago18otherPython
Malware Configuration And Payload Extraction
Vipermonkey777
3 years ago64
A VBA parser and emulation engine to analyze malicious macros.
Xlmmacrodeobfuscator54412 years ago12September 21, 202221apache-2.0Python
Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)
Pe240185 months ago52December 11, 20239mitGo
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
Macholibre85
4 years ago11apache-2.0Python
Mach-O & Universal Binary Parser
Pyonenote84
a year ago2March 19, 20236apache-2.0Python
A python library to parse OneNote (.one) files
Enma_pe56
2 years agomitC++
Cross-platform library for parsing and building PE\PE+ formats
Pdf10
5 years agoNovember 24, 20231mitPython
Malice PDF Plugin
Alternatives To Dc3 Mwcp
Select To Compare


Alternative Project Comparisons
Popular Parser Projects
Popular Malware Analysis Projects
Popular Data Processing Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Python
Malware Analysis