☆19Sep 2, 2018Updated 7 years ago
Alternatives and similar repositories for public
Users that are interested in public are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Golang Library to interact with your MISP instance☆22Sep 12, 2019Updated 6 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 9 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Jun 17, 2017Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆35Apr 16, 2021Updated 4 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Jan 18, 2024Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- My Yara Rules Collection☆52Feb 7, 2016Updated 10 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- ☆19Aug 3, 2023Updated 2 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Simple single-file FUSE implementation of copy-on-write☆10Aug 14, 2014Updated 11 years ago
- Repository for all cbapi example scripts☆16Sep 18, 2018Updated 7 years ago
- PS / Bash / Python / Other scripts For FUN!☆56Nov 19, 2025Updated 4 months ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago