☆16Dec 21, 2023Updated 2 years ago
Alternatives and similar repositories for AutoYara4FLIRT
Users that are interested in AutoYara4FLIRT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDA Python deobfuscation script for ConfuserEx binaries☆35Sep 15, 2022Updated 3 years ago
- ☆11May 1, 2024Updated last year
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- R-CSIRT Linux Triage tool☆39Jun 28, 2018Updated 7 years ago
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 5 months ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- IDA Python3 Plugin to make your RE life easier. Trace execution and save code/memory for detailed exploration.☆32Mar 5, 2024Updated 2 years ago
- Different tools for Microsoft Hyper-V researching☆64Mar 9, 2026Updated 2 weeks ago
- ysoserial for su18☆11Jun 19, 2022Updated 3 years ago
- Python scripts for parsing IDA TIL files.☆31Jul 16, 2021Updated 4 years ago
- IdaClu is a version agnostic IDA Pro plugin for grouping similar functions. Pick an existing grouping algorithm or create your own.☆182Feb 10, 2026Updated last month
- ☆14May 16, 2023Updated 2 years ago
- debug path list environment variables☆13Dec 23, 2025Updated 2 months ago
- Valhalla 🤝 🦀☆21Jan 22, 2026Updated 2 months ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Android markets list including official and third-party from China, Russia, ...☆20Mar 23, 2014Updated 12 years ago
- See the most influential users who have starred or forked a given repo (sorted by earned stars and follower count)☆20Aug 17, 2024Updated last year
- ASTORIA is a framework developed to allow the simulation of attacks and the evaluation of their impact on Smart Grid infrastructures.☆10Feb 5, 2018Updated 8 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- 試試你的好手氣☆41Jan 26, 2026Updated last month
- The Z3-Noodler String Solver☆25Updated this week
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- Python extension for the GNU project debugger (GDB)☆13Mar 6, 2020Updated 6 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- 在线cms识别|旁站|c段|信息泄露|工控|系统|物联网安全|cms漏洞扫描|nmap端口扫描|子域名获取|待续..☆10Apr 23, 2019Updated 6 years ago
- Measurement system I built during my PhD to collect and analyse large-scale datasets; including phishing and malware attacks on Twitter, …☆16Jun 25, 2021Updated 4 years ago
- ☆12Sep 29, 2025Updated 5 months ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Jun 4, 2021Updated 4 years ago
- ABSA Toolkit☆11Jul 31, 2017Updated 8 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- ☆15May 3, 2024Updated last year
- Experiments of the DAI in Healthcare project - skin lesions images use case - using Flower☆12Jun 16, 2022Updated 3 years ago
- Collection of simple anti-debugging tricks for Linux☆59Apr 10, 2018Updated 7 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- API Hammering with C++20☆51Jul 21, 2022Updated 3 years ago
- All documentation, installation and setup instructions to deploy the COSSIM framework. This is the starting point for the COSSIM framewor…☆11Jun 22, 2025Updated 9 months ago
- ☆12May 30, 2019Updated 6 years ago