CAPE Auto-Hardened Installer
☆26Jan 28, 2026Updated last month
Alternatives and similar repositories for CAHI
Users that are interested in CAHI are comparing it to the libraries listed below
Sorting:
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- Sigma rules converted for direct use with Zircolite☆14Feb 26, 2026Updated last week
- ☆17Nov 13, 2024Updated last year
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- Malware Configuration And Payload Extraction☆20Feb 12, 2020Updated 6 years ago
- Detection rules to look for Log4J usage and exploitation☆18Jun 21, 2025Updated 8 months ago
- ☆23Aug 1, 2020Updated 5 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Combination of different utilities, have fun!☆223Feb 5, 2024Updated 2 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Tools for inspecting YARA bytecode☆21Jul 1, 2020Updated 5 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆116Feb 8, 2026Updated 3 weeks ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 3 months ago
- GigaDrop allows you to easily and securely share files directly between devices without uploading them to any server first☆11Sep 4, 2022Updated 3 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Jan 8, 2026Updated last month
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆32Oct 13, 2018Updated 7 years ago
- A YARA rule generator☆62Feb 8, 2026Updated 3 weeks ago
- ☆28Feb 13, 2017Updated 9 years ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆22Updated this week
- Run TFLITE models on the web☆12Jan 2, 2022Updated 4 years ago
- ☆24Jan 31, 2024Updated 2 years ago
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- A rapid development full stack webapp template; FastAPI, SQLModel, Angular, Ionic, Firebase, GCP, Auth0☆12Aug 25, 2025Updated 6 months ago
- Driver firmware for IV3 Clock☆11Feb 17, 2024Updated 2 years ago
- AssemblyLine4 documentation☆28Feb 25, 2026Updated last week
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 2 years ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 3 months ago
- The constitution for a decentralized autonomous organization for accelerating clinical research through open-source software collaboratio…☆11Apr 21, 2022Updated 3 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago