Some rules, scripts of some use to us
☆11Oct 25, 2024Updated last year
Alternatives and similar repositories for rules
Users that are interested in rules are comparing it to the libraries listed below
Sorting:
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- ☆14May 6, 2016Updated 9 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- R package to work with the Shodan API☆18Feb 14, 2018Updated 8 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 5 months ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- Yaras Random☆23Feb 21, 2019Updated 7 years ago
- ☆23Aug 10, 2020Updated 5 years ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- ☆28May 9, 2022Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- ☆30Jul 18, 2025Updated 7 months ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Pebble Watchface: Multifunctional Seven Segment☆11Nov 27, 2017Updated 8 years ago
- PoC CVE-2020-6308☆36Dec 29, 2020Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Good code.☆17Nov 18, 2018Updated 7 years ago
- Go automated nmap scanner☆12Jun 17, 2019Updated 6 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- ☆47Apr 10, 2023Updated 2 years ago
- CAPE monitor DLLs☆41Dec 3, 2019Updated 6 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- This is a database of sample c++ functions that can be run from Unity C# script.☆11Jan 21, 2019Updated 7 years ago