0xThiebaut / Signatures
π§ Currently transfering TLP:CLEAR rules from TLP:AMBER repository...
β21Updated last year
Alternatives and similar repositories for Signatures:
Users that are interested in Signatures are comparing it to the libraries listed below
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is execβ¦β20Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.β27Updated last year
- Collection of generic YARA rulesβ15Updated 9 months ago
- Identifies metadata of .NET binary files.β21Updated 11 months ago
- Lazarus analysis tools and research reportβ55Updated last year
- β25Updated 4 months ago
- Static Decryptor for IcedID Malwareβ18Updated 2 years ago
- Reads and prints information from the website MalAPI.ioβ19Updated 2 years ago
- β34Updated 2 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigationsβ12Updated 2 years ago
- Modular malware analysis artifact collection and correlation frameworkβ53Updated 11 months ago
- Imphash-like calculation on Golang binariesβ49Updated 2 years ago
- Tools for offensive security of NetBackup infrastructuresβ39Updated last year
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testingβ21Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablinβ¦β44Updated 2 years ago
- β18Updated last year
- Extension functionality for the NightHawk operator clientβ27Updated last year
- A proof-of-concept re-assembler for reverse VNC traffic.β25Updated last year
- Golang bindings for PE-sieveβ42Updated last year
- β39Updated last year
- Linux #rootkit and #malware revealerβ24Updated 7 months ago
- β33Updated 3 years ago
- Tools helpful for malware analysisβ22Updated 7 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!β82Updated last year
- A tool that adds reproducible UUIDs to YARA rulesβ13Updated 11 months ago
- Malware Analysis toolsβ25Updated 6 months ago
- β12Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosureβ38Updated last month
- Repository of Volatility3 pluginsβ21Updated 2 years ago
- IDA Python scriptsβ30Updated last year