Yet Another Memory Analyzer for malware detection and Guarding Operations with YARA and SIGMA
☆81Nov 19, 2025Updated 3 months ago
Alternatives and similar repositories for YAMAGoya
Users that are interested in YAMAGoya are comparing it to the libraries listed below
Sorting:
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated 3 weeks ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 4 months ago
- ☆21Nov 19, 2025Updated 3 months ago
- 「渊照」是一款功能强大的专业暗链扫描工具,专注于检测网站、HTML文件或目录中的隐蔽链接、隐藏元素和恶意代码。该工具能够智能识别扫描目标类型(本地文件/目录、内网URL、公网URL),并自动调整扫描策略以获得最佳效果,是安全人员进行网站安全审计和应急响应的理想工具。☆84Nov 29, 2025Updated 3 months ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- ☆23Dec 15, 2022Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- DFIR Timeline Analysis for macOS — SQLite-backed viewer for CSV, TSV, XLSX, EVTX, and Plaso files with built-in process inspection, later…☆136Updated this week
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated last month
- Convert Sigma rules to Wazuh rules☆74Sep 13, 2025Updated 5 months ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆38Apr 23, 2023Updated 2 years ago
- Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagemen…☆100Feb 16, 2026Updated 2 weeks ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated last month
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆125Aug 19, 2025Updated 6 months ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & tra…☆23Jan 3, 2026Updated 2 months ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- A pySigma wrapper to manage detection rules.☆45Feb 17, 2026Updated 2 weeks ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 17, 2026Updated 2 weeks ago
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆11Jul 24, 2025Updated 7 months ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- Keep track of the tasks in Windows Task Scheduler that you care about.☆12Updated this week
- ☆12Feb 28, 2023Updated 3 years ago
- ☆12Oct 6, 2021Updated 4 years ago
- Material for eCHO #11 (https://github.com/isovalent/eCHO/)☆12Jun 25, 2021Updated 4 years ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 2 months ago
- The Modern Web Application Framework for C☆10Oct 30, 2023Updated 2 years ago
- 通过通过jhat解析heapdump文件,从而实现heapdump敏感信息搜索。☆10Feb 7, 2023Updated 3 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Yara sort☆13Updated this week
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago
- A set of crappy Python scripts to handle RSS in an Unix way.☆47Jul 2, 2024Updated last year
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- ☆10Aug 9, 2024Updated last year