JPCERTCC / YAMAGoyaView external linksLinks
Yet Another Memory Analyzer for malware detection and Guarding Operations with YARA and SIGMA
☆81Nov 19, 2025Updated 2 months ago
Alternatives and similar repositories for YAMAGoya
Users that are interested in YAMAGoya are comparing it to the libraries listed below
Sorting:
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Updated this week
- Storage for the IOCs I collect☆11Mar 26, 2025Updated 10 months ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 7 months ago
- 「渊照」是一款功能强大的专业暗链扫描工具,专注于检测网站、HTML文件或目录中的隐蔽链接、隐藏元素和恶意代码。该工具能够智能识别扫描目标类型(本地文件/目录、内网URL、公网URL),并自动调整扫描策略以获得最佳效果,是安全人员进行网站安全审计和应急响应的理想工具。☆82Nov 29, 2025Updated 2 months ago
- ☆21Nov 19, 2025Updated 2 months ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆23Mar 24, 2025Updated 10 months ago
- ☆23Dec 15, 2022Updated 3 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated 11 months ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- Convert Sigma rules to Wazuh rules☆73Sep 13, 2025Updated 5 months ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated last month
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆38Apr 23, 2023Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Nov 9, 2022Updated 3 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- AIL project training materials☆39Jul 17, 2025Updated 6 months ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated 2 weeks ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- A pySigma wrapper to manage detection rules.☆45Jan 27, 2026Updated 2 weeks ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- NTAPI hook bypass with (semi) legit stack trace☆18May 9, 2023Updated 2 years ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 5, 2026Updated last week
- CQL Hub is an open repository of detection and hunting queries for CrowdStrike NextGen SIEM and Falcon LogScale. All queries stored here …☆33Feb 2, 2026Updated last week
- 蓝队笔记--------面向安全事件的实践指南,实战笔记。包含安全事件发现(威胁狩猎)、应急处置(应急响应)、安全数据挖掘、威胁情报等多个方面。☆14Jun 6, 2025Updated 8 months ago
- A set of crappy Python scripts to handle RSS in an Unix way.☆47Jul 2, 2024Updated last year
- ☆10Dec 24, 2022Updated 3 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 4 months ago
- ☆12Feb 13, 2022Updated 4 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Yara sort☆13Updated this week
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 10 months ago
- Material for eCHO #11 (https://github.com/isovalent/eCHO/)☆12Jun 25, 2021Updated 4 years ago
- Publicly accessible version of the FiGHT website.☆16Nov 14, 2025Updated 2 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- A Tmux plug-in that can automatically generate countless charming themes and support a high degree of customization, bringing the most wo…☆15Dec 21, 2025Updated last month
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 2 months ago
- 通过通过jhat解析heapdump文件,从而实现heapdump敏感信息搜索。☆10Feb 7, 2023Updated 3 years ago
- 📚 Hexo theme Obsidianext documentation.☆10Sep 17, 2023Updated 2 years ago
- ☆10Aug 9, 2024Updated last year