Rules shared by the community from 100 Days of YARA 2025
☆38Jan 2, 2026Updated 2 months ago
Alternatives and similar repositories for 2025
Users that are interested in 2025 are comparing it to the libraries listed below
Sorting:
- ☆23Dec 15, 2022Updated 3 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆51Dec 31, 2024Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- Files related to works published in Black Mass☆10Sep 16, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Hunt the windows Registry automatically using VQL☆14Jan 6, 2026Updated 2 months ago
- A yara based MCP Server☆23Updated this week
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Repo to hold mcp server for velociraptor☆32Jul 27, 2025Updated 7 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆54Sep 19, 2025Updated 6 months ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated 2 months ago
- ☆22Jan 31, 2023Updated 3 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆70Mar 15, 2026Updated last week
- ☆10Sep 11, 2021Updated 4 years ago
- ☆11Oct 21, 2020Updated 5 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 7 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 8 months ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Easily create index of your SANS books☆18Oct 28, 2022Updated 3 years ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- IOCs and notes related to malware☆27Jul 7, 2025Updated 8 months ago
- Registry Explorer bookmark definitions☆44Dec 19, 2024Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- Plugins for parsing CSV files in Timeline Explorer. This project allows for anyone to add more supported files (i,e. they get a Line #/ta…☆30May 5, 2025Updated 10 months ago
- mult-answer plugin for CTFd☆15Aug 22, 2019Updated 6 years ago
- AI Security Shared Responsibility Model☆90Sep 26, 2025Updated 5 months ago
- ☆30Jan 13, 2026Updated 2 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 8 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated 2 months ago