A YARA rule generator
☆62Feb 8, 2026Updated 3 weeks ago
Alternatives and similar repositories for yarGen-Go
Users that are interested in yarGen-Go are comparing it to the libraries listed below
Sorting:
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagemen…☆100Feb 16, 2026Updated 2 weeks ago
- ☆17Nov 13, 2024Updated last year
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- ☆23Mar 17, 2024Updated last year
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆43Jan 15, 2026Updated last month
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- plugx rat c2, supports TCP, UDP, HTTP☆14Sep 25, 2024Updated last year
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- ☆16Jan 10, 2017Updated 9 years ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆43Jan 18, 2025Updated last year
- Malware Configuration And Payload Extraction☆20Feb 12, 2020Updated 6 years ago
- Notes on using the Python bindings for the Unicorn Engine☆82Feb 14, 2020Updated 6 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- ☆23Feb 3, 2021Updated 5 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 5 months ago
- XrefGen is a professional-grade cross-reference generator that detects indirect references and complex control-flow patterns that IDA Pro…☆29Feb 1, 2026Updated last month
- scripting IDA like a Pro☆24Oct 27, 2020Updated 5 years ago
- ☆25Nov 24, 2025Updated 3 months ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- A tour of what some Rust language features look like after compilation.☆51Jun 7, 2023Updated 2 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59May 12, 2023Updated 2 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Nov 13, 2024Updated last year
- Linux Shared Library to Shellcode Loader☆84Feb 15, 2026Updated 2 weeks ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆112Updated this week
- Community modules for CAPE Sandbox☆111Feb 24, 2026Updated last week
- ☆27Nov 26, 2024Updated last year
- AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)☆249Jan 21, 2026Updated last month
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆44Mar 6, 2025Updated 11 months ago