CAPE Auto-Hardened Installer
☆26Jan 28, 2026Updated 3 months ago
Alternatives and similar repositories for CAHI
Users that are interested in CAHI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 2 months ago
- Malware Configuration And Payload Extraction☆20Feb 12, 2020Updated 6 years ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- ☆23Aug 1, 2020Updated 5 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆119Apr 28, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Imphash-like calculation on Golang binaries☆50Jul 2, 2022Updated 3 years ago
- Tool for controlling the special features of a "U3 smart drive" USB Flash disk.☆12Dec 23, 2015Updated 10 years ago
- [Moved to Codeberg] Tools for inspecting YARA bytecode☆21Jul 1, 2020Updated 5 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- An automatically updated list of IP addresses associated with the widely used free and privacy-focused VPN provider, ProtonVPN.☆36Updated this week
- Summarize CTI reports with OpenAI☆18Apr 27, 2026Updated last week
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- Use i3 with GNOME Session integration for Ubuntu 18.04☆12Dec 10, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- This repository is a part of GSoC Project 2019 which intends to add the macOS support for Cuckoo Sandbox. This repository helps setting u…☆11Aug 26, 2019Updated 6 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- The DataExplorer plugin integrates the pattern language from ImHex into x64dbg.☆91Mar 15, 2026Updated last month
- Driver firmware for IV3 Clock☆11Feb 17, 2024Updated 2 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- A python script file to decrypt encrypted IEE (802.11) Radio .pcap files captured via Wireshark for extraction and analyse.☆10Sep 8, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Yara rules☆21Mar 27, 2023Updated 3 years ago
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- ☆30Jan 31, 2024Updated 2 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- ☆25Jun 27, 2025Updated 10 months ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆46Apr 9, 2026Updated 3 weeks ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58May 24, 2021Updated 4 years ago
- Hijacker for Linux Phones☆18Jul 16, 2025Updated 9 months ago
- Scans and catches callbacks of systems that are impacted by Log4J Log4Shell vulnerability across specific headers.☆59Dec 11, 2021Updated 4 years ago
- Detection rules to look for Log4J usage and exploitation☆18Jun 21, 2025Updated 10 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated 2 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago