Some rules, scripts of some use to us
☆11Oct 25, 2024Updated last year
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below
Sorting:
- A tool for detecting sensitive data in code repositories☆18Feb 25, 2026Updated 3 weeks ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- CIS benchmark quickplay for rapid assessments of the NGFW☆13Jul 27, 2023Updated 2 years ago
- ☆14May 6, 2016Updated 9 years ago
- Tools to search through massive amounts of data☆21Oct 20, 2025Updated 5 months ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 6 months ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Scripts to aid in diagnosing and repairing unhealthy Windows Falcon Sensor installations☆28Aug 16, 2024Updated last year
- R package to work with the Shodan API☆18Feb 14, 2018Updated 8 years ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- Pebble Watchface: Multifunctional Seven Segment☆11Nov 27, 2017Updated 8 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Free and open-source medical device discovery and identification☆38Jul 16, 2022Updated 3 years ago
- Virtual Tagger Plugin is a Cutter plugin that significantly improves handling and analysis of vtables and virtual functions☆16Mar 23, 2023Updated 2 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- JSON-based DSLs are not for humans..☆10Sep 4, 2014Updated 11 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- iCTF 2013 service based on a DalvikVM☆22Dec 10, 2013Updated 12 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆17Oct 13, 2022Updated 3 years ago
- This is a database of sample c++ functions that can be run from Unity C# script.☆12Jan 21, 2019Updated 7 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆49Jan 26, 2022Updated 4 years ago
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- A simple, fast, deeply embeddable memory management system (malloc, free). Fast, light. < 1K byte heaps possible.☆11Dec 12, 2017Updated 8 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- ☆13May 17, 2016Updated 9 years ago