Putting the Sauce in CyberChef - making CyberChef automatable
☆19Feb 18, 2026Updated last month
Alternatives and similar repositories for CyberSaucier
Users that are interested in CyberSaucier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated last year
- A server providing RESTful access to CyberChef☆168Feb 28, 2026Updated 3 weeks ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Sep 4, 2018Updated 7 years ago
- ☆21Apr 19, 2024Updated last year
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆108Mar 4, 2021Updated 5 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 6 months ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- Malware Sinkhole List in various formats☆104Jul 6, 2022Updated 3 years ago
- ☆21Oct 28, 2021Updated 4 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- ☆11Aug 28, 2024Updated last year
- Watchtower, monitoring your Slack workspaces.☆16Jan 26, 2021Updated 5 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- JSON-based DSLs are not for humans..☆10Sep 4, 2014Updated 11 years ago
- ☆15Apr 12, 2018Updated 7 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 2 months ago
- ☆15Nov 29, 2017Updated 8 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆52Jan 25, 2018Updated 8 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Password recovery payload for the BashBunny, using LaZagne.☆13Jan 7, 2021Updated 5 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆16Jan 12, 2017Updated 9 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- Some tools usable for reengineering the VideoCore IV processor found on the Raspberry Pi.☆24Feb 14, 2013Updated 13 years ago
- Apps for Splunk Phantom security automation | Cisco Meraki | Ansible Tower | F5 | A10☆24May 29, 2020Updated 5 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- A Python package to search & delete messages from mailboxes in Office 365 using Microsoft Graph API☆25Feb 15, 2022Updated 4 years ago
- ☆34Updated this week
- Realizes to write macros in any scripts into any languages.☆23Mar 20, 2017Updated 9 years ago