Yara Plugin for Binary Ninja
☆13Feb 13, 2018Updated 8 years ago
Alternatives and similar repositories for BinaryNinjaYaraPlugin
Users that are interested in BinaryNinjaYaraPlugin are comparing it to the libraries listed below
Sorting:
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- Linear IL view for Binary Ninja☆13Feb 28, 2017Updated 9 years ago
- Plugin for binary ninja to centralize features useful in static analysis.☆15Mar 3, 2020Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- An extendable, tabbed, dockable UI widget plugin for BinaryNinja https://binary.ninja.☆37Sep 18, 2016Updated 9 years ago
- MSP430 Microcontroller CPU plugin for Hopper Disassembler☆12May 13, 2017Updated 8 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- Binary ninja plugins☆17Sep 15, 2016Updated 9 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- ☆28Feb 11, 2026Updated 3 weeks ago
- OpenSSH 6.7p1 backdoor kit☆21Oct 23, 2014Updated 11 years ago
- first commit☆23Feb 16, 2026Updated 2 weeks ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Jul 10, 2019Updated 6 years ago
- ☆28Dec 20, 2018Updated 7 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Mar 14, 2017Updated 8 years ago
- Binary Ninja plugin for Voltron integration☆164Jun 22, 2018Updated 7 years ago
- Converts crontab expressions to human-readable descriptions☆25Sep 17, 2018Updated 7 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Mar 22, 2017Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Linux backdoor implementation written in Python☆58May 25, 2015Updated 10 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 6 months ago
- ☆26May 7, 2016Updated 9 years ago
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago