{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"malware-research","owner":"eset","isFork":false,"description":"Code written as part of our various malware investigations","allTopics":["python","malware-analysis","malware-research"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":367,"forksCount":87,"license":"BSD 2-Clause \"Simplified\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-14T11:00:02.970Z"}},{"type":"Public","name":"ipyida","owner":"eset","isFork":false,"description":"IPython console integration for IDA Pro","allTopics":["python","ipython","ida","ida-pro","ida-plugin","idapython"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":4,"starsCount":694,"forksCount":71,"license":"Other","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-06T14:24:46.075Z"}},{"type":"Public","name":"nimfilt","owner":"eset","isFork":false,"description":"A collection of modules and scripts to help with analyzing Nim binaries","allTopics":["nim","reverse-engineering","ida","ida-pro","malware-analysis","ida-plugin","nim-language","idapython","nim-lang","demangling"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":55,"forksCount":5,"license":"BSD 2-Clause \"Simplified\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-11T18:59:13.211Z"}},{"type":"Public","name":"jupyter_client","owner":"eset","isFork":true,"description":"Jupyter protocol client APIs","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":273,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-06T12:19:51.561Z"}},{"type":"Public","name":"jupyter-kernel-proxy","owner":"eset","isFork":false,"description":"Jupyter kernel acting as a proxy to any other, already running, kernel.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-24T05:37:41.736Z"}},{"type":"Public","name":"AlphaGolang","owner":"eset","isFork":true,"description":"IDAPython scripts for analyzing GoLang binaries","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":64,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-23T20:04:42.614Z"}},{"type":"Public","name":"wslink-vm-analyzer","owner":"eset","isFork":false,"description":"WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware","allTopics":["virtual-machine","reverse-engineering","malware","deobfuscation","miasm"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":44,"forksCount":4,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-05T21:59:03.792Z"}},{"type":"Public","name":"stadeo","owner":"eset","isFork":false,"description":"Control-flow-flattening and string deobfuscator","allTopics":["python","strings","reverse-engineering","malware","deobfuscation","control-flow","ida","ida-pro","idapython","deobfuscator","emotet","miasm","stantinko"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":140,"forksCount":15,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-11-08T11:33:30.404Z"}},{"type":"Public","name":"miasm","owner":"eset","isFork":true,"description":"Reverse engineering framework in Python","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":465,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-07-24T13:57:22.161Z"}},{"type":"Public","name":"FIDL","owner":"eset","isFork":true,"description":"A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":71,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-11-29T21:07:59.597Z"}},{"type":"Public","name":"idapython-src","owner":"eset","isFork":true,"description":"IDAPython project for Hex-Ray's IDA Pro","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":285,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-10-22T13:36:33.952Z"}},{"type":"Public","name":"volatility-browserhooks","owner":"eset","isFork":false,"description":"Volatility Framework plugin to detect various types of hooks as performed by banking Trojans","allTopics":["volatility","malware-detection","volatility-plugins","volatility-framework"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":39,"forksCount":17,"license":"BSD 2-Clause \"Simplified\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-12-14T11:32:54.262Z"}},{"type":"Public","name":"vba-dynamic-hook","owner":"eset","isFork":false,"description":"VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":144,"forksCount":39,"license":"BSD 2-Clause \"Simplified\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-03-17T13:45:23.127Z"}},{"type":"Public","name":"cuckoo","owner":"eset","isFork":true,"description":"Cuckoo Sandbox is an automated dynamic malware analysis system","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":9,"forksCount":1693,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2014-08-07T21:31:45.799Z"}}],"repositoryCount":14,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}